搜索
SEC511 - Continuous Monitoring and Security Operations
磁力链接/BT种子名称
SEC511 - Continuous Monitoring and Security Operations
磁力链接/BT种子简介
种子哈希:
801551349d5128e4d81696d098b7a6f27b40934d
文件大小:
22.44G
已经下载:
3203
次
下载速度:
极快
收录时间:
2024-05-01
最近下载:
2024-11-18
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:801551349D5128E4D81696D098B7A6F27B40934D
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
91视频
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
抖阴破解版
暗网禁地
91短视频
TikTok成人版
PornHub
草榴社区
乱伦社区
最近搜索
御姐型
地铁偷拍
胖叔
破解 中出
可爱萝莉系列
杭州白嫩性感漂亮美女和闺蜜男友酒店见面时不小心中招被各种蹂躏虐玩后啪啪
小皮鞋
山东淄博杨金光性侵儿媳门事儿子敲锣当街骂爹未流出过的50分钟有声完整版
焕儿
club-098
キミはやさしく寝取られる+the+animation+第1-6巻
drool 2009
九头身大长腿极品嫩模 纯欲白丝扶腰后入嫩穴 端庄高雅女神被大鸡巴操成发情小母狗 翘起屁屁乖乖让大鸡巴
姐弟口交
腿+内射
atid-550
the.painter.2024
不学好学妹
baldurs.gate.3.gog
✨漂亮短发小少妇口活一流,又骚又会玩,掰开豹纹内裤主动撩鸡巴插入
小视频
부부의 세계
背包女
ami takase
western movie 2024
少合集
悠久を染める 和更紗
雪玲儿合集
deadpool.and.wolverine.2024.720p.ma.web-dl.dd+5.1.
撸啊
文件列表
USB 2020/Sec511 Virtual Machine.iso
14.8 GB
VoD 2020/6. Capstone Design Detect Defend/1. Capstone Design Detect Defend/3. Section 6 Continuous Monitoring and Security Operations Capstone.mp4
1.3 GB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/24. SEC511 Workbook Initial Configuration and Connection.mp4
241.9 MB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/28. SEC511 Workbook Pcap Strings and File Carving ZeekBro.mp4
182.7 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/12. Instructor Demo Security Onion.mp4
181.5 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/20. SEC511 Course PortalWiki.mp4
173.7 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/16. SEC511 Workbook Detecting Traditional Attack Techniques.mp4
157.1 MB
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/20. SEC511 Workbook Sysmon.mp4
146.1 MB
VoD 2020/3. Network Security Monitoring/9. Cornerstone NSM/8. SEC511 Workbook Sguil ServiceSide Analysis.mp4
144.1 MB
VoD 2020/2. Network Security Architecture/16. Section Two Summary/5. SEC511 Workbook Honeytokens for Leak Detection.mp4
140.7 MB
MP3 2020/SEC511_5D_E01.mp3
140.0 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/13. Section One Summary/5. SEC511 Workbook Egress Analysis with Elastic Stack.mp4
132.6 MB
MP3 2020/SEC511_3D_E01.mp3
123.3 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/1. Current State Assessment SOCs and Security Architecture.mp4
117.9 MB
MP3 2020/SEC511_1D_E01.mp3
114.1 MB
MP3 2020/SEC511_2D_E01.mp3
110.0 MB
VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/12. SEC511 Workbook Autoruns.mp4
109.0 MB
MP3 2020/SEC511_4D_E01.mp3
107.8 MB
MP3 2020/SEC511_2A_E01.mp3
84.7 MB
MP3 2020/SEC511_4A_E01.mp3
84.4 MB
MP3 2020/SEC511_5A_E01.mp3
83.8 MB
MP3 2020/SEC511_4B_E01.mp3
81.7 MB
MP3 2020/SEC511_3A_E01.mp3
80.3 MB
VoD 2020/5. Automation and Continuous Security Monitoring/15. Section 5 Summary/3. SEC511 Workbook Persistence and Pivoting.mp4
79.4 MB
MP3 2020/SEC511_2B_E01.mp3
76.4 MB
MP3 2020/SEC511_2C_E01.mp3
76.3 MB
MP3 2020/SEC511_3B_E01.mp3
75.9 MB
MP3 2020/SEC511_1A_E01.mp3
73.3 MB
MP3 2020/SEC511_1B_E01.mp3
70.0 MB
VoD 2020/3. Network Security Monitoring/15. SectionThree Summary/3. SEC511 Workbook 5113 Final Exercise.mp4
69.4 MB
VoD 2020/4. Endpoint Security Architecture/1. Endpoint Security Architecture Overview/2. Table of Contents 1.mp4
66.3 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/12. SEC511 Workbook Detecting Modern Attack Techniques.mp4
63.6 MB
MP3 2020/SEC511_1C_E01.mp3
61.4 MB
MP3 2020/SEC511_5C_E01.mp3
60.8 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/4. Course Roadmap 1.mp4
60.0 MB
MP3 2020/SEC511_3C_E01.mp3
55.7 MB
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/2. Table of Contents 1.mp4
55.3 MB
VoD 2020/6. Capstone Design Detect Defend/1. Capstone Design Detect Defend/2. Capstone Overview.mp4
55.3 MB
VoD 2020/4. Endpoint Security Architecture/16. Section 4 Summary/5. SEC511 Workbook AppLocker.mp4
55.3 MB
VoD 2020/2. Network Security Architecture/4. Web Application Firewalls/11. SEC511 Workbook ModSecurity.mp4
54.1 MB
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/16. Lets Try Long Tail Analysis on Windows Security Logs.mp4
53.3 MB
MP3 2020/SEC511_5B_E01.mp3
52.0 MB
VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/13. SEC511 Workbook Application Detection and Control with Snort OpenAppId.mp4
51.2 MB
MP3 2020/SEC511_4C_E01.mp3
50.6 MB
VoD 2020/2. Network Security Architecture/16. Section Two Summary/2. Day 2 Punch ListAction Items.mp4
49.8 MB
MP3 2020/SEC511_6A_E01.mp3
47.4 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/13. Section One Summary/4. Course Roadmap 2.mp4
45.3 MB
PDF 2020/SEC511_E01_01_16905.pdf
44.4 MB
VoD 2020/4. Endpoint Security Architecture/16. Section 4 Summary/1. Course Roadmap 1.mp4
43.2 MB
VoD 2020/3. Network Security Monitoring/15. SectionThree Summary/2. Day 3 Punch ListAction Items.mp4
41.3 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/43. SEC511 Workbook Windows Event Logs.mp4
40.3 MB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/2. Table of Contents 1.mp4
36.8 MB
VoD 2020/5. Automation and Continuous Security Monitoring/6. Passive OS Detection/10. SEC511 Workbook p0f v3.mp4
32.5 MB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/3. Table of Contents 2.mp4
31.2 MB
VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/13. SEC511 Workbook Inventory.mp4
29.1 MB
VoD 2020/5. Automation and Continuous Security Monitoring/15. Section 5 Summary/2. Day 5 Punch ListAction Items.mp4
27.6 MB
VoD 2020/3. Network Security Monitoring/1. Getting Started/3. Table of Contents 2.mp4
24.9 MB
VoD 2020/4. Endpoint Security Architecture/1. Endpoint Security Architecture Overview/1. Endpoint Security Architecture 1.mp4
22.6 MB
VoD 2020/2. Network Security Architecture/16. Section Two Summary/3. Day 2 TLDR.mp4
22.4 MB
VoD 2020/2. Network Security Architecture/2. Routers/9. Unexpected Destinations.mp4
22.4 MB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/1. Network Security Architecture.mp4
21.4 MB
VoD 2020/4. Endpoint Security Architecture/3. Patching/3. Patch Timeline Metrics.mp4
20.5 MB
VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/8. Layer 4 Outbound Filtering.mp4
20.2 MB
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/17. Example Difference between SnortSuricata and ZeekBro.mp4
19.7 MB
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/12. Example Sysmon XML Configuration.mp4
19.6 MB
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/15. The Long Tail 1.mp4
19.4 MB
VoD 2020/4. Endpoint Security Architecture/14. Advanced Authentication Attacks/10. Advanced Authentication Attack Mitigations.mp4
18.8 MB
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/6. Meterpreter Payload Not So Normal.mp4
18.6 MB
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/14. NIST SP 800137 Automation Domains.mp4
18.4 MB
VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/5. Application IdentificationInspection.mp4
17.8 MB
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/1. Automation and Continuous Security Monitoring.mp4
17.7 MB
VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/10. freqing Awesome.mp4
17.7 MB
VoD 2020/3. Network Security Monitoring/2. Network Security Monitoring Overview/7. Good Hunting.mp4
15.9 MB
VoD 2020/5. Automation and Continuous Security Monitoring/2. Industry Best Practices/10. ASD Mitigation Strategies to Detect and Respond.mp4
15.4 MB
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/2. Endpoint Protection Platforms EPP.mp4
15.3 MB
VoD 2020/2. Network Security Architecture/5. Forward Proxies/8. MIMEContentType BlockingAlerting.mp4
15.1 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/17. dnscat2 Wireshark View.mp4
15.0 MB
VoD 2020/2. Network Security Architecture/6. Encryption and TLS Inspection/10. DoH DNS Request.mp4
14.7 MB
VoD 2020/2. Network Security Architecture/10. Malware Detonation Devices/2. Malware Detonation Devices.mp4
14.5 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/9. ThirdParty Detection.mp4
14.4 MB
VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/7. Bring Out the Baggett.mp4
14.3 MB
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/11. Wireshark.mp4
14.2 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/8. Know Thy Victim.mp4
14.1 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/12. Whitecap One Approach to Detect Malicious ICMP.mp4
14.0 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/14. Also Beware of the Perfect Attacker Fallacy.mp4
13.7 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/3. Adversarial Dominance/4. Definition of Winning.mp4
13.7 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/10. Identification of Source.mp4
13.3 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/5. The Whitelist.mp4
13.0 MB
VoD 2020/4. Endpoint Security Architecture/12. Security Support Provider/7. Microsoft Account Password Lengths and Truncation.mp4
12.9 MB
VoD 2020/2. Network Security Architecture/2. Routers/5. Profile Outbound Flows.mp4
12.6 MB
VoD 2020/4. Endpoint Security Architecture/11. Authentication/8. LMLaMe.mp4
12.6 MB
VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/10. Process Monitor.mp4
12.5 MB
VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/9. Builtin Administrator.mp4
12.2 MB
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/3. Monitoring a NonDefensible Network.mp4
12.2 MB
VoD 2020/5. Automation and Continuous Security Monitoring/6. Passive OS Detection/2. Passive Host Discovery.mp4
12.2 MB
VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/11. Bots Love Spam.mp4
12.1 MB
VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/7. Key Privileges.mp4
11.9 MB
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/9. Sguil in Action III.mp4
11.8 MB
VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/12. Service Accounts.mp4
11.7 MB
VoD 2020/2. Network Security Architecture/4. Web Application Firewalls/6. WAF Deployments.mp4
11.7 MB
VoD 2020/4. Endpoint Security Architecture/5. EMET and Windows Defender Exploit Guard/8. Windows Defender Technologies in a Table Part 1 from Minerva Labs 1.mp4
11.6 MB
VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/5. Additional Layer 3 Inbound Filtering.mp4
11.6 MB
VoD 2020/2. Network Security Architecture/12. Security Information and Event Management SIEM/6. Dual Stack SIEM Compliance Tactical.mp4
11.6 MB
VoD 2020/2. Network Security Architecture/5. Forward Proxies/7. Blacklisting Billions.mp4
11.4 MB
VoD 2020/2. Network Security Architecture/2. Routers/3. RouterBased Detection IPFIXNetFlow.mp4
11.4 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/13. Beware of the Perfect Solution Fallacy.mp4
11.4 MB
VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/5. NIDS Configuration.mp4
11.2 MB
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/10. Department of Homeland Securitys CDM.mp4
11.2 MB
VoD 2020/2. Network Security Architecture/15. Threat Intelligence/6. DetectRespond Lifecycle.mp4
11.1 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/14. Demos Exercises and the Capstone.mp4
10.9 MB
VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/9. Now Were Logging DNS Whats Next.mp4
10.9 MB
VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/9. Always Test.mp4
10.7 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/10. Local View Meterpreter Payload.mp4
10.7 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/31. Critical Event 9 Detecting Lateral Movement.mp4
10.5 MB
VoD 2020/5. Automation and Continuous Security Monitoring/2. Industry Best Practices/5. Top 4 Mitigation Strategies.mp4
10.5 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/7. People and Process Products.mp4
10.5 MB
VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/11. Local Administrator Password Solution LAPS.mp4
10.4 MB
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/8. DoD Risk Management Framework.mp4
10.4 MB
VoD 2020/2. Network Security Architecture/5. Forward Proxies/11. Splash Proxy.mp4
10.4 MB
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/15. Endpoint Detection and Response EDR.mp4
10.4 MB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/8. BeyondCorp Googles Approach to Zero Trust.mp4
10.3 MB
VoD 2020/5. Automation and Continuous Security Monitoring/4. Maintaining Situational Awareness/2. Maintaining Situational Awareness.mp4
10.3 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/10. Ransomware.mp4
10.2 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/7. Ponemon Cost of a Data Breach.mp4
10.1 MB
VoD 2020/2. Network Security Architecture/6. Encryption and TLS Inspection/8. DNS over TLS DoT.mp4
10.0 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/3. DBIR State of the Phish.mp4
10.0 MB
VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/4. Default Deny Inbound.mp4
10.0 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/5. Verizon DBIR.mp4
9.9 MB
VoD 2020/4. Endpoint Security Architecture/11. Authentication/6. Windows A Low Sodium Architecture.mp4
9.9 MB
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/9. Windows Data Classification Tools.mp4
9.9 MB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/7. Zero Trust Architecture ZTA.mp4
9.9 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/19. Actionable Information Immediate Results.mp4
9.5 MB
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/13. Sensor Placement.mp4
9.3 MB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/9. ZTA and Modern Architectures.mp4
9.3 MB
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/10. Sysmon Capabilities.mp4
9.3 MB
VoD 2020/4. Endpoint Security Architecture/5. EMET and Windows Defender Exploit Guard/3. EMET.mp4
9.2 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/6. Phishing with Links.mp4
9.0 MB
VoD 2020/4. Endpoint Security Architecture/11. Authentication/7. No Salt Illustrated.mp4
9.0 MB
VoD 2020/5. Automation and Continuous Security Monitoring/2. Industry Best Practices/6. ASD Essential Eight Prevent Malware Delivery and Execution.mp4
8.9 MB
VoD 2020/2. Network Security Architecture/2. Routers/8. HighVolume Outbound Connections.mp4
8.9 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/35. Attacker View Metasploit PsExec PasstheHash 1.mp4
8.9 MB
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/17. BeltandSuspenders Detective Whitelisting Process.mp4
8.8 MB
VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/14. Baseline Monitoring.mp4
8.8 MB
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/4. Security Event ID 4688.mp4
8.8 MB
VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/1. Course Roadmap.mp4
8.8 MB
VoD 2020/2. Network Security Architecture/16. Section Two Summary/1. Course Roadmap 1.mp4
8.7 MB
VoD 2020/4. Endpoint Security Architecture/14. Advanced Authentication Attacks/2. PasstheHash.mp4
8.6 MB
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/13. IMPHASH Hash.mp4
8.5 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/4. ServiceSide Exploitation Illustrated.mp4
8.5 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/9. Malvertising.mp4
8.5 MB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/19. Transaction Data Example.mp4
8.5 MB
VoD 2020/2. Network Security Architecture/6. Encryption and TLS Inspection/3. Enterprise Responses to Outbound HTTPS Encryption.mp4
8.5 MB
VoD 2020/2. Network Security Architecture/8. Network Intrusion Prevention Systems/3. NIPS NGFW.mp4
8.4 MB
VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/3. Foreverday 0day.mp4
8.4 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/11. Making the MSSP Manage YOUR Security Services.mp4
8.4 MB
VoD 2020/3. Network Security Monitoring/14. Tracking Encryption Certificates/7. Detecting Malware.mp4
8.4 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/37. Didnt Microsoft Fix This.mp4
8.2 MB
VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/5. ent Classic Entropy Analysis.mp4
8.2 MB
VoD 2020/4. Endpoint Security Architecture/2. Windows Endpoints/4. Endpoints More Than Desktops.mp4
8.2 MB
VoD 2020/3. Network Security Monitoring/5. NIDS Design/9. Anomaly Detection.mp4
8.1 MB
VoD 2020/2. Network Security Architecture/6. Encryption and TLS Inspection/9. DNS Over HTTPS DoH .mp4
8.1 MB
VoD 2020/2. Network Security Architecture/10. Malware Detonation Devices/6. Malware Detonation vs Scenario 2 Client PreventionDetection.mp4
8.1 MB
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/7. Mirror Ports.mp4
8.0 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/5. Attaching the Evil.mp4
8.0 MB
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/8. Sguil in Action II.mp4
7.9 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/4. Mandiant MTrends.mp4
7.9 MB
VoD 2020/2. Network Security Architecture/10. Malware Detonation Devices/3. MDD Capabilities.mp4
7.9 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/33. Track the Use of Local Credentials via the Network.mp4
7.9 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/11. Command and Control.mp4
7.8 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/11. Lets Get Physical.mp4
7.8 MB
VoD 2020/2. Network Security Architecture/4. Web Application Firewalls/5. WAF PreventionDetection.mp4
7.8 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/14. The Other MS PSExec ExploitPersistC2Exfil.mp4
7.7 MB
VoD 2020/4. Endpoint Security Architecture/11. Authentication/4. Password ReuseSynchronization.mp4
7.7 MB
VoD 2020/2. Network Security Architecture/13. Adversary Deception Devices/5. Internal Listening Honeypots.mp4
7.6 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/12. Hidden OutSOC Costs.mp4
7.6 MB
VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/13. freqserverpy For freqing at Scale.mp4
7.6 MB
VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/6. DNS Analytical Logging on Windows 2012R2.mp4
7.6 MB
VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/6. Assessing ent.mp4
7.6 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/13. Minnows 1.mp4
7.5 MB
VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/2. Monitoring Service Logs.mp4
7.5 MB
VoD 2020/3. Network Security Monitoring/2. Network Security Monitoring Overview/3. What Is Continuous Security Monitoring.mp4
7.5 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/6. Perimeter Focused.mp4
7.4 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/10. Mandiant MTrends Example C2 via HTTP POST.mp4
7.4 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/15. Shell Meterpreter.mp4
7.4 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/12. Quoting Rob Joyce .mp4
7.4 MB
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/4. Focus on Critical Systems and Data.mp4
7.4 MB
VoD 2020/2. Network Security Architecture/4. Web Application Firewalls/4. WAF Capabilities.mp4
7.4 MB
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/9. Bejtlich on RMF.mp4
7.4 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/22. Iodine DNS Tunneling.mp4
7.4 MB
VoD 2020/3. Network Security Monitoring/5. NIDS Design/8. Protocol Behavior.mp4
7.4 MB
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/17. Targeted AnomalyBased EXE Rule.mp4
7.4 MB
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/3. Log Full Command Line of All Processes.mp4
7.4 MB
VoD 2020/2. Network Security Architecture/13. Adversary Deception Devices/7. Tactical Honeypots.mp4
7.3 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/6. Kill Chain ATTCK.mp4
7.3 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/10. Watering Hole Attacks.mp4
7.3 MB
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/8. What Is Wrong with This Picture.mp4
7.3 MB
VoD 2020/2. Network Security Architecture/12. Security Information and Event Management SIEM/2. Security Information and Event Management SIEM.mp4
7.3 MB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/6. What About that Soft Chewy Center.mp4
7.3 MB
VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/7. Another SI vs NGFW Scenario.mp4
7.2 MB
VoD 2020/3. Network Security Monitoring/1. Getting Started/2. Table of Contents 1.mp4
7.2 MB
VoD 2020/3. Network Security Monitoring/12. Tracking User Agents/7. Our Approach on the Contagio Crimeware Pcap Collection.mp4
7.2 MB
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/17. Test PowerShell Command.mp4
7.2 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/13. Attacker Uses Metasploit PsExec Exploit.mp4
7.1 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/2. Monitoring Critical Windows Events.mp4
7.1 MB
VoD 2020/3. Network Security Monitoring/5. NIDS Design/12. Know Thy Network.mp4
7.1 MB
VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/11. SI Firewall vs Scenario 2 Client Prevention.mp4
7.1 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/10. Pivoting Pictorially 4.mp4
7.0 MB
VoD 2020/5. Automation and Continuous Security Monitoring/14. PostIntrusion Detection/5. Kansa Go BigWide or Go Home.mp4
7.0 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/11. CryptoLocker.mp4
6.9 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/6. Modern Attack Techniques/6. ClientSide Exploitation Phishing Illustrated Part 1.mp4
6.9 MB
VoD 2020/2. Network Security Architecture/6. Encryption and TLS Inspection/7. Encryption Beyond HTTPS.mp4
6.8 MB
VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/4. Other NIDS Placement.mp4
6.8 MB
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/12. The Broken Windows Theory.mp4
6.8 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/6. Modern Attack Techniques/3. WellFunded Adversaries.mp4
6.8 MB
VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/6. DBIRMTrends Is Internal Detection Improving.mp4
6.7 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/15. Zeus Botnet C2 via DNS.mp4
6.6 MB
VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/11. Domain Generation Algorithms DGAs.mp4
6.6 MB
VoD 2020/4. Endpoint Security Architecture/2. Windows Endpoints/3. Endpoints More Than Windows.mp4
6.6 MB
VoD 2020/5. Automation and Continuous Security Monitoring/6. Passive OS Detection/4. p0f version 3.mp4
6.6 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/7. Traditional versus Modern C2.mp4
6.6 MB
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/4. Security Onion ServerSensor Design.mp4
6.5 MB
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/9. Sysmon Application Monitoring.mp4
6.5 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/8. DeviceDriven Security.mp4
6.5 MB
VoD 2020/2. Network Security Architecture/5. Forward Proxies/4. Proxy Configuration of Clients.mp4
6.5 MB
VoD 2020/3. Network Security Monitoring/6. Analysis Methodology/4. How This Applies to NSM.mp4
6.4 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/3. Malware Phones Home.mp4
6.4 MB
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/10. DeepBlueCLI.mp4
6.4 MB
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/16. Detecting Unusual and Unsigned Drivers and Images with Sysmon.mp4
6.4 MB
VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/12. NIDS Scenario 2 Detection FTW.mp4
6.4 MB
VoD 2020/5. Automation and Continuous Security Monitoring/6. Passive OS Detection/1. Course Roadmap 1.mp4
6.3 MB
VoD 2020/2. Network Security Architecture/5. Forward Proxies/3. Proxy or Bust.mp4
6.3 MB
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/12. Tshark.mp4
6.3 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/12. Capstone NetWars.mp4
6.3 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/6. Lateral Movement.mp4
6.3 MB
VoD 2020/5. Automation and Continuous Security Monitoring/7. Vulnerability Scanning/6. VulnWhisperer.mp4
6.3 MB
VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/7. Admin Elevated PowerShell.mp4
6.3 MB
VoD 2020/4. Endpoint Security Architecture/14. Advanced Authentication Attacks/6. The Sed Persistent Threat SPT.mp4
6.3 MB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/8. Extracted Data.mp4
6.2 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/8. ClientSide Targets/7. Flash EndofLife in 2020.mp4
6.2 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/17. Default Egress Deny.mp4
6.2 MB
VoD 2020/4. Endpoint Security Architecture/11. Authentication/11. Password Storage.mp4
6.1 MB
VoD 2020/4. Endpoint Security Architecture/5. EMET and Windows Defender Exploit Guard/4. RIP EMET.mp4
6.1 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/5. Kill Chain Phases.mp4
6.1 MB
VoD 2020/3. Network Security Monitoring/2. Network Security Monitoring Overview/6. Form a Threating Hunting Team.mp4
6.1 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/8. Credential Compromise.mp4
6.1 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/11. Disrupting NationState Hackers.mp4
6.0 MB
VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/2. Reducing Privileges.mp4
6.0 MB
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/7. High Data in All the Wrong Places.mp4
5.9 MB
VoD 2020/4. Endpoint Security Architecture/1. Endpoint Security Architecture Overview/6. CIS Controls Critical Security Controls.mp4
5.9 MB
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/7. Sguil in Action I.mp4
5.8 MB
VoD 2020/4. Endpoint Security Architecture/5. EMET and Windows Defender Exploit Guard/6. EMET Configuration GUI.mp4
5.8 MB
VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/12. FirefoxDoH.mp4
5.7 MB
VoD 2020/4. Endpoint Security Architecture/3. Patching/5. To Test or Not to Test.mp4
5.7 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/9. Stage 2 and Persistence Visibility.mp4
5.7 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/6. Purpose of a SOC.mp4
5.7 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/13. Hiding.mp4
5.7 MB
VoD 2020/3. Network Security Monitoring/6. Analysis Methodology/2. Analysis Methodology.mp4
5.7 MB
VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/5. User Rights and Privileges.mp4
5.7 MB
VoD 2020/2. Network Security Architecture/6. Encryption and TLS Inspection/5. Decrypting HTTPS with InterceptionInspection.mp4
5.6 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/3. Windows Event Log Locations.mp4
5.6 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/10. Outsourcing the SOC.mp4
5.6 MB
VoD 2020/2. Network Security Architecture/2. Routers/10. Outbound Visualization.mp4
5.6 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/12. Whitelisting Administrative Overhead.mp4
5.5 MB
VoD 2020/4. Endpoint Security Architecture/11. Authentication/10. NT.mp4
5.5 MB
VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/3. High Entropy Examples.mp4
5.5 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/6. Modern Attack Techniques/2. Motivated Adversaries.mp4
5.4 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/6. Modern Attack Techniques/4. Web Application Attacks.mp4
5.4 MB
VoD 2020/2. Network Security Architecture/6. Encryption and TLS Inspection/6. Never Decrypt All The Things.mp4
5.3 MB
VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/10. NIDS vs Scenario 2 Client Detection 1.mp4
5.3 MB
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/8. Network Taps.mp4
5.3 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/15. FieldedSystem Executables.mp4
5.3 MB
VoD 2020/4. Endpoint Security Architecture/13. PostAuthentication/7. Delegate Tokens.mp4
5.3 MB
VoD 2020/3. Network Security Monitoring/5. NIDS Design/4. How Much Malware Is There.mp4
5.2 MB
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/5. Security Onion Included Software.mp4
5.2 MB
VoD 2020/4. Endpoint Security Architecture/3. Patching/4. Nation States 0days and APT Oh My.mp4
5.2 MB
VoD 2020/2. Network Security Architecture/12. Security Information and Event Management SIEM/7. SIEMs Killer App Log Enrichment.mp4
5.2 MB
VoD 2020/2. Network Security Architecture/10. Malware Detonation Devices/1. Course Roadmap.mp4
5.1 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/4. Application not file Whitelist.mp4
5.1 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/3. Presumption of Compromise.mp4
5.1 MB
VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/7. IDS Trust Relationships Visualized.mp4
5.1 MB
VoD 2020/2. Network Security Architecture/8. Network Intrusion Prevention Systems/2. Network Intrusion Prevention Systems NIPS.mp4
5.1 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/13. Spot the C2.mp4
5.1 MB
VoD 2020/5. Automation and Continuous Security Monitoring/8. Monitoring Patching/6. Quick and Dirty Linux Patch Checks.mp4
5.1 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/19. Relationship to Cyber Defense.mp4
5.1 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/7. Critical Windows Event to Monitor.mp4
5.1 MB
VoD 2020/2. Network Security Architecture/4. Web Application Firewalls/3. Web Application Firewalls.mp4
5.0 MB
VoD 2020/3. Network Security Monitoring/6. Analysis Methodology/1. Course Roadmap.mp4
5.0 MB
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/5. Windows Defender Firewall.mp4
5.0 MB
VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/5. CIS 51 Secure Baseline Configuration.mp4
4.9 MB
VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/6. Admin Unelevated PowerShell.mp4
4.9 MB
VoD 2020/2. Network Security Architecture/14. SwitchesPVLAN Security/4. VLAN ACLs VACLs.mp4
4.9 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/23. Critical Event 5 Clearing Event Logs.mp4
4.9 MB
VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/7. Bejtlich South Carolina Department of Revenue DoR Case Study.mp4
4.9 MB
VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/4. SMBv1 and the West Coast Hippy Lifestyle.mp4
4.9 MB
VoD 2020/4. Endpoint Security Architecture/12. Security Support Provider/2. Security Support Provider SSP.mp4
4.9 MB
VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/3. UAC Less Privilege Is More Security.mp4
4.9 MB
VoD 2020/5. Automation and Continuous Security Monitoring/7. Vulnerability Scanning/2. Vulnerability Scanning.mp4
4.9 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/14. DNS The Ideal C2 Channel.mp4
4.8 MB
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/13. Detection without Response.mp4
4.8 MB
VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/4. But Im an Admin.mp4
4.8 MB
VoD 2020/5. Automation and Continuous Security Monitoring/6. Passive OS Detection/3. Passive Scanning.mp4
4.8 MB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/15. Pcap Strings Example.mp4
4.8 MB
VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/3. Perimeter NIDS Placement.mp4
4.8 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/5. Proactive Detection Threat Hunting.mp4
4.7 MB
VoD 2020/5. Automation and Continuous Security Monitoring/7. Vulnerability Scanning/3. CIS 31 Vulnerability Scanning.mp4
4.6 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/16. Exercise EnvironmentLaptop Requirements.mp4
4.6 MB
VoD 2020/2. Network Security Architecture/2. Routers/7. Persistent Outbound Connections.mp4
4.6 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/7. Addresses Layer 34.mp4
4.6 MB
VoD 2020/2. Network Security Architecture/15. Threat Intelligence/2. Threat Intelligence.mp4
4.6 MB
VoD 2020/6. Capstone Design Detect Defend/1. Capstone Design Detect Defend/1. Section 6 Capstone Design Detect Defend.mp4
4.6 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/20. Phase 1 Targeted Detection.mp4
4.6 MB
VoD 2020/3. Network Security Monitoring/2. Network Security Monitoring Overview/8. Threat Hunting Team HowTo.mp4
4.5 MB
VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/8. Persistence.mp4
4.5 MB
VoD 2020/2. Network Security Architecture/10. Malware Detonation Devices/4. Cuckoo Sandbox.mp4
4.5 MB
VoD 2020/2. Network Security Architecture/14. SwitchesPVLAN Security/2. Switches.mp4
4.5 MB
VoD 2020/4. Endpoint Security Architecture/1. Endpoint Security Architecture Overview/5. Endpoint Security Architecture 2.mp4
4.5 MB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/5. Traditional Perimeter Defense and the Crunchy Shell.mp4
4.5 MB
VoD 2020/4. Endpoint Security Architecture/13. PostAuthentication/4. Access Tokens.mp4
4.5 MB
VoD 2020/5. Automation and Continuous Security Monitoring/8. Monitoring Patching/5. Linux Patch Compliance.mp4
4.5 MB
VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/7. What Does Admin Mean.mp4
4.4 MB
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/6. Identifying Windows EXEs.mp4
4.4 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/6. Relatively Benign Malware.mp4
4.3 MB
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/3. NSM Distribution.mp4
4.3 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/16. dnscat2 and Iodine.mp4
4.3 MB
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/18. DeepWhite.mp4
4.3 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/5. ServiceSide Traditionaland Current.mp4
4.3 MB
VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/13. ChromeDoH.mp4
4.3 MB
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/8. Next Step Long Tail Analysis.mp4
4.3 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/13. StartJoin the Conversation.mp4
4.3 MB
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/10. NSM Toolbox Wireshark and Tshark.mp4
4.3 MB
VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/6. How Many Administrative Accounts.mp4
4.3 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/8. Advanced Denial of Service.mp4
4.2 MB
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/15. Practical Issues Time Zones and Daylight Saving Time.mp4
4.2 MB
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/14. Sysmon Event Filtering.mp4
4.2 MB
VoD 2020/2. Network Security Architecture/14. SwitchesPVLAN Security/9. SwitchInternal SI Firewall and Pivoting.mp4
4.2 MB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/9. Carving Files with Wireshark Step 1 Identify the File.mp4
4.2 MB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/11. Cyber Defense Illustrated.mp4
4.2 MB
VoD 2020/4. Endpoint Security Architecture/11. Authentication/1. Course Roadmap.mp4
4.2 MB
VoD 2020/5. Automation and Continuous Security Monitoring/2. Industry Best Practices/2. Industry Best Practices.mp4
4.2 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/24. Blocking Detection.mp4
4.2 MB
VoD 2020/4. Endpoint Security Architecture/1. Endpoint Security Architecture Overview/7. First Five CIS Controls.mp4
4.2 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/9. Pivoting Pictorially 3.mp4
4.2 MB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/13. Or Use ZeekBro.mp4
4.2 MB
VoD 2020/2. Network Security Architecture/6. Encryption and TLS Inspection/4. CIS 1210 Decrypt Network Traffic at Proxy.mp4
4.2 MB
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/14. Practical Issues NTP.mp4
4.2 MB
VoD 2020/2. Network Security Architecture/5. Forward Proxies/6. Web Content Filters.mp4
4.1 MB
VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/13. LSA Secrets.mp4
4.1 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/5. Persistent External Network Connections.mp4
4.1 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/15. System Event ID 7045 Sysinternals versus Metasploit PsExec.mp4
4.1 MB
VoD 2020/2. Network Security Architecture/14. SwitchesPVLAN Security/7. Potential Issues with Private VLANs.mp4
4.1 MB
VoD 2020/3. Network Security Monitoring/14. Tracking Encryption Certificates/8. A Simple Approach to Detecting Malware via Certificates.mp4
4.1 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/15. SOC Employee Training.mp4
4.1 MB
VoD 2020/4. Endpoint Security Architecture/14. Advanced Authentication Attacks/3. Token Smuggling Pass the Session.mp4
4.0 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/6. Current State Assessment.mp4
4.0 MB
VoD 2020/4. Endpoint Security Architecture/12. Security Support Provider/9. LiveSSP FAIL.mp4
4.0 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/9. Critical Event 1 CommandLine Auditing.mp4
4.0 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/33. AppLocker Phase 0 Rule Creation.mp4
4.0 MB
VoD 2020/4. Endpoint Security Architecture/12. Security Support Provider/3. SSP Impact of Single SignOn.mp4
4.0 MB
VoD 2020/3. Network Security Monitoring/2. Network Security Monitoring Overview/2. What Is Network Security Monitoring.mp4
4.0 MB
VoD 2020/2. Network Security Architecture/14. SwitchesPVLAN Security/6. Private VLANs PVLANs.mp4
4.0 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/8. ClientSide Targets/5. Browser Attacks without Exploits.mp4
4.0 MB
VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/7. How NOT to Build a Config.mp4
4.0 MB
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/11. Solve Problems as They Are Discovered.mp4
3.9 MB
VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/8. Center for Internet Security.mp4
3.9 MB
VoD 2020/2. Network Security Architecture/4. Web Application Firewalls/2. CIS 1810 Deploy Web Application Firewalls.mp4
3.9 MB
VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/6. Behavioral Proxy Checks.mp4
3.9 MB
VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/10. Builtin Administrator Passwords.mp4
3.9 MB
VoD 2020/2. Network Security Architecture/15. Threat Intelligence/5. Indicator Identification.mp4
3.9 MB
VoD 2020/4. Endpoint Security Architecture/12. Security Support Provider/4. SSP WDigest.mp4
3.9 MB
VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/1. Course Roadmap.mp4
3.9 MB
VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/6. OpenAppId.mp4
3.9 MB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/12. Save the EXE Check the File Type Hash and Scan with Antivirus.mp4
3.9 MB
VoD 2020/4. Endpoint Security Architecture/14. Advanced Authentication Attacks/11. MultiFactor Authentication MFA.mp4
3.9 MB
VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/4. exploitwindowslocalservicepermissions.mp4
3.9 MB
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/12. Umbrella Sensor.mp4
3.8 MB
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/4. Stage 2 EXE.mp4
3.8 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/9. Endpoint Security Architecture.mp4
3.8 MB
VoD 2020/4. Endpoint Security Architecture/5. EMET and Windows Defender Exploit Guard/5. EMET Features.mp4
3.8 MB
VoD 2020/5. Automation and Continuous Security Monitoring/6. Passive OS Detection/5. PRADS.mp4
3.8 MB
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/10. HostBased IDS.mp4
3.8 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/8. C2 Protocols.mp4
3.8 MB
VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/2. Inevitable Exploitation.mp4
3.8 MB
VoD 2020/2. Network Security Architecture/13. Adversary Deception Devices/4. Traditional Honeypots.mp4
3.8 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/12. Persistence.mp4
3.8 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/18. Short Links.mp4
3.7 MB
VoD 2020/2. Network Security Architecture/6. Encryption and TLS Inspection/2. Encrypt All the Things.mp4
3.7 MB
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/16. Spotting the Adversary with Windows Event Log Monitoring Version 2.mp4
3.7 MB
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/13. How EXEs Should Not Move.mp4
3.7 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/8. Key SOC Roles.mp4
3.7 MB
VoD 2020/4. Endpoint Security Architecture/14. Advanced Authentication Attacks/4. Pass the Password.mp4
3.7 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/4. Damaged Windows Event Logs.mp4
3.7 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/8. ClientSide Targets/4. Browser Attacks.mp4
3.7 MB
VoD 2020/4. Endpoint Security Architecture/13. PostAuthentication/3. Logon Types.mp4
3.6 MB
VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/12. Application Compatibility Toolkit ACT.mp4
3.6 MB
VoD 2020/5. Automation and Continuous Security Monitoring/8. Monitoring Patching/3. Standalone Microsoft Patch Scanning.mp4
3.6 MB
VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/3. Understanding Stateful.mp4
3.6 MB
VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/9. NIDS vs Scenario 1 Web Detection.mp4
3.6 MB
VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/4. SI vs NGFW Example.mp4
3.6 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/26. Previously Trusted Binaries.mp4
3.5 MB
VoD 2020/3. Network Security Monitoring/1. Getting Started/5. A Note on Exercises.mp4
3.5 MB
VoD 2020/3. Network Security Monitoring/14. Tracking Encryption Certificates/4. Spot the Difference.mp4
3.5 MB
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/6. Data Classification HowTo.mp4
3.5 MB
VoD 2020/3. Network Security Monitoring/5. NIDS Design/3. Signature Matching.mp4
3.5 MB
VoD 2020/3. Network Security Monitoring/12. Tracking User Agents/5. Abnormal HTTP User Agents.mp4
3.4 MB
VoD 2020/2. Network Security Architecture/2. Routers/4. IPFIXNetFlow Data.mp4
3.4 MB
VoD 2020/2. Network Security Architecture/4. Web Application Firewalls/8. WAF vs Scenario 1 Web App Detection.mp4
3.4 MB
VoD 2020/5. Automation and Continuous Security Monitoring/7. Vulnerability Scanning/5. OpenVAS.mp4
3.4 MB
VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/5. Enable DNS Query Logging on Windows 20082012.mp4
3.4 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/18. Cortex.mp4
3.4 MB
VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/2. A Word on Entropy.mp4
3.4 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/26. C2 POST Content.mp4
3.4 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/2. Identifying Command and Control Traffic.mp4
3.4 MB
VoD 2020/5. Automation and Continuous Security Monitoring/2. Industry Best Practices/3. CIS Controls.mp4
3.4 MB
VoD 2020/2. Network Security Architecture/5. Forward Proxies/2. Forward Proxies.mp4
3.3 MB
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/3. EPP AntivirusAntimalware.mp4
3.3 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/6. Modern Attack Techniques/5. Layer 8Social Engineering.mp4
3.3 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/9. Oh Yeah Drinking the Flavored Drink Mix.mp4
3.3 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/25. HTTP POST C2.mp4
3.3 MB
VoD 2020/2. Network Security Architecture/13. Adversary Deception Devices/1. Course Roadmap.mp4
3.3 MB
VoD 2020/3. Network Security Monitoring/12. Tracking User Agents/6. Tracking User Agents 2.mp4
3.3 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/7. Pivoting Pictorially 1.mp4
3.3 MB
VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/13. Configuration Change Monitoring.mp4
3.3 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/5. Also Not a SOC.mp4
3.3 MB
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/5. What Is Continuous Security Monitoring.mp4
3.3 MB
VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/11. NIDS vs Scenario 2 Client Detection 2.mp4
3.3 MB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/4. Packet Data.mp4
3.2 MB
VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/8. Case Study NotPetya.mp4
3.2 MB
VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/3. Layer 7 Firewalling.mp4
3.2 MB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/19. PostExploitation Data Exfiltration.mp4
3.2 MB
VoD 2020/5. Automation and Continuous Security Monitoring/7. Vulnerability Scanning/4. Security Content Automation Protocol SCAP.mp4
3.2 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/8. ClientSide Targets/9. Maliciously Crafted Files.mp4
3.2 MB
VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/12. SI Firewall vs Scenario 2 Client Detection.mp4
3.2 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/26. Critical Event 7 External Media Detection.mp4
3.2 MB
VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/12. Maersk Information Security Improvements.mp4
3.2 MB
VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/4. Check Your DNS.mp4
3.2 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/3. Adversarial Dominance/2. Fighting a Losing Battle.mp4
3.2 MB
VoD 2020/4. Endpoint Security Architecture/3. Patching/2. Patching.mp4
3.2 MB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/16. Flow Data.mp4
3.1 MB
VoD 2020/2. Network Security Architecture/15. Threat Intelligence/13. Other FileURL Analysis.mp4
3.1 MB
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/6. Hubs.mp4
3.1 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/8. ClientSide Targets/6. Browser Plugin Exploits.mp4
3.1 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/4. Unencrypted pLagUe Botnet C2 Traffic.mp4
3.1 MB
VoD 2020/2. Network Security Architecture/12. Security Information and Event Management SIEM/3. Data Overload.mp4
3.1 MB
VoD 2020/2. Network Security Architecture/12. Security Information and Event Management SIEM/5. DefineSIEM.mp4
3.1 MB
VoD 2020/2. Network Security Architecture/5. Forward Proxies/12. Forward Proxy vs Scenario 2 Client Prevention.mp4
3.1 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/6. PostExploitation Focused.mp4
3.1 MB
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/1. Course Roadmap 1.mp4
3.1 MB
VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/5. Proxies Rule.mp4
3.1 MB
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/7. This Program Must Be Run under Win32.mp4
3.1 MB
VoD 2020/3. Network Security Monitoring/2. Network Security Monitoring Overview/5. Its More Complicated than Threats versus Vulnerabilities.mp4
3.1 MB
VoD 2020/2. Network Security Architecture/12. Security Information and Event Management SIEM/9. SIEM and Detection.mp4
3.1 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/7. Three Categories Will Emerge.mp4
3.1 MB
VoD 2020/4. Endpoint Security Architecture/3. Patching/6. Patch Rinse Repeat.mp4
3.0 MB
VoD 2020/3. Network Security Monitoring/12. Tracking User Agents/4. Windows Versions in User Agent Strings.mp4
3.0 MB
VoD 2020/3. Network Security Monitoring/13. C2 via HTTPS/7. Normal HTTPS.mp4
3.0 MB
VoD 2020/2. Network Security Architecture/12. Security Information and Event Management SIEM/4. SIEM Centralized Log Collection.mp4
3.0 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/32. Use of Local versus Domain Credentials.mp4
3.0 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/19. Hybrid Approach.mp4
3.0 MB
VoD 2020/3. Network Security Monitoring/13. C2 via HTTPS/9. Follow TCP Stream.mp4
3.0 MB
VoD 2020/2. Network Security Architecture/15. Threat Intelligence/4. Kill Chain Revisited.mp4
3.0 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/17. Trusting Signed Binaries by Specific Vendors.mp4
3.0 MB
VoD 2020/3. Network Security Monitoring/13. C2 via HTTPS/5. SSLTLS without HTTPS.mp4
3.0 MB
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/6. Acronym Soup.mp4
3.0 MB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/24. Recon Watering Hole ID.mp4
3.0 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/18. Critical Event 3 User Creation.mp4
3.0 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/3. Threat Intelligence.mp4
3.0 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/16. Data Exfiltration Analysis.mp4
3.0 MB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/14. String Data.mp4
2.9 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/25. Event Viewer System Log View.mp4
2.9 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/28. Critical Event 8 Disabling the Firewall.mp4
2.9 MB
VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/10. NGFW vs Scenario 2 Client Prevention.mp4
2.9 MB
VoD 2020/5. Automation and Continuous Security Monitoring/14. PostIntrusion Detection/3. Memory Analysis.mp4
2.9 MB
VoD 2020/5. Automation and Continuous Security Monitoring/14. PostIntrusion Detection/4. Redline.mp4
2.9 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/6. Modern Attack Techniques/9. Why ClientSide Exploitation.mp4
2.9 MB
VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/2. Shadow Brokers Patching Hardening.mp4
2.9 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/8. PostExploitation Visibility Analysis.mp4
2.9 MB
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/11. Sysmon Syntax.mp4
2.9 MB
VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/3. The Tao of Network Security Monitoring.mp4
2.9 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/14. NSRL RDS Reference Dataset.mp4
2.9 MB
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/17. The US Governments Take on CSM Lessons Learned.mp4
2.9 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/27. Hash Bypass.mp4
2.8 MB
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/11. Predictable Transfer of EXEs.mp4
2.8 MB
VoD 2020/2. Network Security Architecture/5. Forward Proxies/5. WPAD.mp4
2.8 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/21. TrueFalse Positive.mp4
2.8 MB
VoD 2020/3. Network Security Monitoring/12. Tracking User Agents/2. Tracking User Agents 1.mp4
2.8 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/9. Traditional Successes.mp4
2.8 MB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/22. Example Sguil IDS Alert.mp4
2.8 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/10. RiskInformed.mp4
2.8 MB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/5. Full Packet Capture.mp4
2.8 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/21. Iodine Raw Tunnel.mp4
2.8 MB
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/18. NSM Toolbox SIEMs.mp4
2.8 MB
VoD 2020/4. Endpoint Security Architecture/11. Authentication/9. Is LM Finally behind Us.mp4
2.8 MB
VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/8. Get Your freqpy On.mp4
2.8 MB
VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/11. Ndiff.mp4
2.7 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/16. Meterpreter Open Source Payload Capabilities.mp4
2.7 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/16. PreFielded System Executables.mp4
2.7 MB
VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/12. DGA Beyond Domain Generation Algorithms.mp4
2.7 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/23. Phase 2 Strict Enforcement.mp4
2.7 MB
VoD 2020/5. Automation and Continuous Security Monitoring/8. Monitoring Patching/1. Course Roadmap.mp4
2.7 MB
VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/8. RightsPermissions.mp4
2.7 MB
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/16. Use Case SamSam Spreading via WMI and PsExec.mp4
2.7 MB
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/7. Not Windows Defender Firewall.mp4
2.7 MB
VoD 2020/2. Network Security Architecture/4. Web Application Firewalls/7. WAF vs Scenario 1 Web App Prevention.mp4
2.7 MB
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/5. Windows Registry Startup Keys.mp4
2.7 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/7. WebBased Delivery.mp4
2.7 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/8. ResponseDriven.mp4
2.7 MB
VoD 2020/4. Endpoint Security Architecture/14. Advanced Authentication Attacks/9. Announcing Mimiyakz The Sed Persistent Threat SPT Strikes Again.mp4
2.7 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/7. Defensible Network Security Architecture.mp4
2.6 MB
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/2. Importance of Automation.mp4
2.6 MB
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/5. Command Lines to Look For.mp4
2.6 MB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/10. Key Infrastructure Devices.mp4
2.6 MB
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/1. Course Roadmap.mp4
2.6 MB
VoD 2020/4. Endpoint Security Architecture/13. PostAuthentication/2. PostAuthentication.mp4
2.6 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/5. Sanity Check Illustrated.mp4
2.6 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/11. SSH Tunneled via ICMP.mp4
2.6 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/24. HTTP C2.mp4
2.6 MB
VoD 2020/3. Network Security Monitoring/9. Cornerstone NSM/5. ServiceSide Exploits.mp4
2.6 MB
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/6. NSMNIDS Frontends.mp4
2.6 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/27. Event Viewer System Log View New USB Drive.mp4
2.5 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/20. Critical Event 4 Adding Users to Privileged Groups.mp4
2.5 MB
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/11. DeepBlueCLI Partial List of Detected Events.mp4
2.5 MB
VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/9. SI Firewall vs Scenario 1 Web App Prevention.mp4
2.5 MB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/31. Illustrations Applied.mp4
2.5 MB
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/14. Key CSM Technique Long Tail Analysis.mp4
2.5 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/6. Modern Attack Techniques/8. ClientSide Exploitation Phishing Illustrated Part 3.mp4
2.5 MB
VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/11. Microsoft Security Compliance Toolkit SCT.mp4
2.5 MB
VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/6. Default Deny Outbound.mp4
2.5 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/3. Adversarial Dominance/6. New Security Paradigm.mp4
2.5 MB
VoD 2020/5. Automation and Continuous Security Monitoring/2. Industry Best Practices/8. ASD Essential Eight Recover Data and System Availability.mp4
2.5 MB
VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/2. Privileged Account Monitoring.mp4
2.5 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/13. Mandiant MTrends on MetasploitPSExec.mp4
2.5 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/10. Postmortem Detection.mp4
2.5 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/7. HighVolume Compromise.mp4
2.4 MB
VoD 2020/2. Network Security Architecture/10. Malware Detonation Devices/5. Malwr.mp4
2.4 MB
VoD 2020/3. Network Security Monitoring/12. Tracking User Agents/3. Common User Agent Substrings.mp4
2.4 MB
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/7. Example PowerShell Script.mp4
2.4 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/13. DIY SOC.mp4
2.4 MB
VoD 2020/5. Automation and Continuous Security Monitoring/10. Monitoring Change to Devices and Appliances/4. BuiltIn Change Detection Cisco Routers.mp4
2.4 MB
VoD 2020/5. Automation and Continuous Security Monitoring/8. Monitoring Patching/4. GetMissingUpdates.mp4
2.4 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/31. Software Restriction Policies.mp4
2.4 MB
VoD 2020/3. Network Security Monitoring/13. C2 via HTTPS/3. NonEncrypted HTTPS 1.mp4
2.4 MB
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/14. Bro Zeek.mp4
2.4 MB
VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/3. Adversary Privilege.mp4
2.4 MB
VoD 2020/3. Network Security Monitoring/12. Tracking User Agents/8. Another Method Identify the Shortest UserAgents.mp4
2.4 MB
VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/9. ASEPs.mp4
2.4 MB
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/13. Broken Windows Theory of Defensible Networks.mp4
2.4 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/30. Adding Specific Firewall Rules.mp4
2.4 MB
VoD 2020/3. Network Security Monitoring/5. NIDS Design/11. Detecting Specific Anomalies.mp4
2.4 MB
VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/6. Key User Rights.mp4
2.4 MB
VoD 2020/2. Network Security Architecture/15. Threat Intelligence/3. TTPs.mp4
2.3 MB
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/16. Host Detection without HIDSEDR.mp4
2.3 MB
VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/12. Which Outbound Ports to BlockLogAlert.mp4
2.3 MB
VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/7. Case Study Naked Downloads.mp4
2.3 MB
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/18. Use Case DeepBlueCLI vs PowerShell via WMIC and PsExec.mp4
2.3 MB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/7. Full Packet Capture Tools.mp4
2.3 MB
VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/1. Course Roadmap.mp4
2.3 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/12. Mobile Small but Evil.mp4
2.3 MB
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/14. ASD Mitigation Strategy Endpoint Detection and Response.mp4
2.3 MB
VoD 2020/5. Automation and Continuous Security Monitoring/2. Industry Best Practices/9. The ASD Top 4 Focus on Prevention.mp4
2.3 MB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/11. Edit the File.mp4
2.3 MB
VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/5. Inventories.mp4
2.3 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/18. Outbound Blocking FTW.mp4
2.3 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/3. ServiceSide Exploitation.mp4
2.3 MB
VoD 2020/4. Endpoint Security Architecture/3. Patching/7. Modern Patching Challenges.mp4
2.3 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/21. SOC Sounds Like There Should Be a Book About That.mp4
2.3 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/24. Critical Event 6 Terminal Services Certificate Creation.mp4
2.3 MB
VoD 2020/2. Network Security Architecture/2. Routers/14. Routers vs Scenario 2 Client Prevention.mp4
2.3 MB
VoD 2020/5. Automation and Continuous Security Monitoring/2. Industry Best Practices/4. ASD Strategies to Mitigate Cyber Security Incidents.mp4
2.3 MB
VoD 2020/4. Endpoint Security Architecture/2. Windows Endpoints/5. Endpoints Beyond DesktopsServers.mp4
2.3 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/6. Whitelist Integrity.mp4
2.2 MB
VoD 2020/5. Automation and Continuous Security Monitoring/10. Monitoring Change to Devices and Appliances/3. Two Approaches to Detect Device Change.mp4
2.2 MB
VoD 2020/3. Network Security Monitoring/2. Network Security Monitoring Overview/4. Richard Bejtlich NSM versus CSM.mp4
2.2 MB
VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/2. Evolution of NSM.mp4
2.2 MB
VoD 2020/2. Network Security Architecture/13. Adversary Deception Devices/6. HighValue Deception.mp4
2.2 MB
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/8. Protect High Data.mp4
2.2 MB
VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/4. Programmatic Entropy Analysis.mp4
2.2 MB
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/3. NSM Sensors and Servers.mp4
2.2 MB
VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/5. Why Not Replace Detection with Prevention.mp4
2.2 MB
VoD 2020/2. Network Security Architecture/13. Adversary Deception Devices/2. Adversary Deception Devices.mp4
2.2 MB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/24. SnortSourcefire Tagging Syntax.mp4
2.2 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/3. Adversarial Dominance/5. GoalOriented Defense.mp4
2.2 MB
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/1. Course Roadmap.mp4
2.2 MB
VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/9. Leveraging Firewall Logs.mp4
2.2 MB
VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/8. Proxies Allow Easy Detection of C2.mp4
2.2 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/1. Course Roadmap.mp4
2.2 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/6. Modern Attack Techniques/7. ClientSide Exploitation Phishing Illustrated Part 2.mp4
2.1 MB
VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/7. Layer 3 Outbound Filtering.mp4
2.1 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/6. Inventory Persistent External Connections.mp4
2.1 MB
VoD 2020/2. Network Security Architecture/14. SwitchesPVLAN Security/1. Course Roadmap.mp4
2.1 MB
VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/8. Enable Response Logging on Bind 9.mp4
2.1 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/19. Event Viewer Security Log View net user sec511 sekrit add.mp4
2.1 MB
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/1. Course Roadmap 1.mp4
2.1 MB
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/12. Approaches to HIDS.mp4
2.1 MB
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/15. Sysmon Event Filtering II.mp4
2.1 MB
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/5. Tracking EXEs 2.mp4
2.1 MB
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/2. Tracking EXEs 1.mp4
2.1 MB
VoD 2020/5. Automation and Continuous Security Monitoring/14. PostIntrusion Detection/2. PostIntrusion Detection.mp4
2.1 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/2. Step 1 Admit There Is a Problem.mp4
2.0 MB
VoD 2020/3. Network Security Monitoring/6. Analysis Methodology/3. Sherlock Holmes on Deduction.mp4
2.0 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/12. Event IDs 7045 and 4697 normal Service Creation.mp4
2.0 MB
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/4. Security Onion.mp4
2.0 MB
VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/3. Cant Secure What You Dont Have or Dont Know You Have.mp4
2.0 MB
VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/2. Network Intrusion Detection Systems NIDS.mp4
2.0 MB
VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/10. Autoruns.mp4
2.0 MB
VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/8. User Visibility and Reputation.mp4
2.0 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/1. Course Roadmap.mp4
2.0 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/9. ICMP.mp4
2.0 MB
VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/3. NTFS Permissions.mp4
2.0 MB
VoD 2020/2. Network Security Architecture/15. Threat Intelligence/9. File and URL Analysis.mp4
2.0 MB
VoD 2020/2. Network Security Architecture/15. Threat Intelligence/8. IOCs.mp4
2.0 MB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/2. NSM Data Sources 1.mp4
2.0 MB
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/10. Sniffing Virtual Traffic.mp4
1.9 MB
VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/9. freqteststring.mp4
1.9 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/29. Event Viewer View Disabling the Firewall.mp4
1.9 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/8. Acquiring Innocuous Binaries.mp4
1.9 MB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/17. Pcap Flow Example Using Tshark.mp4
1.9 MB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/25. Weaponization Watering Hole Established.mp4
1.9 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/38. PasstheHash and Lateral Movement Mitigation.mp4
1.9 MB
VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/4. Mandatory Proxies.mp4
1.9 MB
VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/7. Host Port and Service Discovery.mp4
1.9 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/8. Network Security Monitoring NSM.mp4
1.9 MB
VoD 2020/4. Endpoint Security Architecture/5. EMET and Windows Defender Exploit Guard/9. Windows Defender Technologies in a Table Part 2 from Minerva Labs 1.mp4
1.9 MB
VoD 2020/3. Network Security Monitoring/14. Tracking Encryption Certificates/2. Tracking Encryption Certificates.mp4
1.9 MB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/28. Pivot Target Acquired.mp4
1.9 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/14. InSOC.mp4
1.9 MB
VoD 2020/4. Endpoint Security Architecture/5. EMET and Windows Defender Exploit Guard/7. Windows Defender Exploit Guard WDEG.mp4
1.9 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/9. Layer 7 Aware.mp4
1.9 MB
VoD 2020/3. Network Security Monitoring/1. Getting Started/1. Network Security Monitoring.mp4
1.9 MB
VoD 2020/3. Network Security Monitoring/5. NIDS Design/6. How Difficult Is Signature Evasion.mp4
1.9 MB
VoD 2020/2. Network Security Architecture/5. Forward Proxies/1. Course Roadmap.mp4
1.9 MB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/29. Goal Achieved Data Exfiltration.mp4
1.8 MB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/6. Storage Required for Full Packet Capture.mp4
1.8 MB
VoD 2020/3. Network Security Monitoring/13. C2 via HTTPS/4. NonEncrypted HTTPS 2.mp4
1.8 MB
VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/11. DoH and DoT.mp4
1.8 MB
VoD 2020/5. Automation and Continuous Security Monitoring/10. Monitoring Change to Devices and Appliances/2. Monitoring Change in Critical Devices and Appliances.mp4
1.8 MB
VoD 2020/4. Endpoint Security Architecture/14. Advanced Authentication Attacks/5. Mandiant MTrends on Mimikatz.mp4
1.8 MB
VoD 2020/3. Network Security Monitoring/14. Tracking Encryption Certificates/5. Example X509 Certificate.mp4
1.8 MB
VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/10. CIS 6 Audit Logs.mp4
1.8 MB
VoD 2020/2. Network Security Architecture/2. Routers/2. Routers.mp4
1.8 MB
VoD 2020/2. Network Security Architecture/5. Forward Proxies/9. MIMEContentType Illustrated.mp4
1.8 MB
VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/6. Asset Inventory.mp4
1.8 MB
VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/2. Leveraging Proxy and Firewall Data.mp4
1.8 MB
VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/9. NotPetya Financial Cost.mp4
1.8 MB
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/3. Automation Example Windows Startup Registry Keys.mp4
1.8 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/1. Course Roadmap.mp4
1.8 MB
VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/5. Administrative Accounts.mp4
1.7 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/41. Summary Critical Windows Events to Monitor.mp4
1.7 MB
VoD 2020/3. Network Security Monitoring/13. C2 via HTTPS/6. The HTTPS SSLTLS Handshake.mp4
1.7 MB
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/12. DeepBlueCLI Regex Matching Command Lines.mp4
1.7 MB
VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/2. Know Thy Software.mp4
1.7 MB
VoD 2020/2. Network Security Architecture/14. SwitchesPVLAN Security/5. CIS 143 Disable WorkstationtoWorkstation Communication.mp4
1.7 MB
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/13. DeepBlueCLI Whitelist.mp4
1.7 MB
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/9. Port Overload.mp4
1.7 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/3. Security Operations Centers SOC.mp4
1.7 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/16. System Event ID 7030 Track Errors.mp4
1.7 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/34. PasstheHash Detection.mp4
1.7 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/3. PreventionOriented.mp4
1.7 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/4. Exfiltration.mp4
1.7 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/14. Persistence versus Hiding.mp4
1.7 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/18. dnscat2 Whats Happening.mp4
1.7 MB
VoD 2020/5. Automation and Continuous Security Monitoring/6. Passive OS Detection/8. CleanedUp Output.mp4
1.7 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/5. Viewing Windows Security Event Logs.mp4
1.7 MB
VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/11. NGFW vs Scenario 2 Client Detection.mp4
1.6 MB
VoD 2020/3. Network Security Monitoring/6. Analysis Methodology/6. Dirty Word List.mp4
1.6 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/6. Verizon DBIR on Detection.mp4
1.6 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/2. Advanced PostExploitation.mp4
1.6 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/8. ClientSide Targets/3. BrowserBased Exploitation.mp4
1.6 MB
VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/9. CIS Benchmarks.mp4
1.6 MB
VoD 2020/2. Network Security Architecture/4. Web Application Firewalls/1. Course Roadmap 1.mp4
1.6 MB
VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/10. DNS over HTTPS DoH and DNS over TLS DoT.mp4
1.6 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/4. Malicious Emails.mp4
1.6 MB
VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/6. Building a Baseline Config.mp4
1.6 MB
VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/4. NSM versus NIDS.mp4
1.6 MB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/27. PostExploitation C2 Establishment.mp4
1.6 MB
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/15. Origin of Zeek.mp4
1.6 MB
VoD 2020/3. Network Security Monitoring/5. NIDS Design/2. Fundamental NIDS Design.mp4
1.6 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/28. Arent advanced attackers moving towards code and DLL injection.mp4
1.6 MB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/23. Tagged Data.mp4
1.6 MB
VoD 2020/3. Network Security Monitoring/13. C2 via HTTPS/10. Tor C2.mp4
1.6 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/12. Pivoting Lateral Movement Analysis.mp4
1.6 MB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/10. Step 2 Choose the Conversation and Save As.mp4
1.5 MB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/15. Scenario 1 Web Application Attack.mp4
1.5 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/32. AppLocker.mp4
1.5 MB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/18. Transaction Data.mp4
1.5 MB
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/11. Gains from HIDS.mp4
1.5 MB
VoD 2020/4. Endpoint Security Architecture/11. Authentication/5. Windows Password Hashes.mp4
1.5 MB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/12. Caprica 6 vs the Colonies.mp4
1.5 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/11. CSM 2.mp4
1.5 MB
VoD 2020/3. Network Security Monitoring/6. Analysis Methodology/5. NSM Analysis Methodology.mp4
1.5 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/11. C2CCCNC.mp4
1.5 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/4. Prevention Sanity Check.mp4
1.5 MB
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/18. Our Approach to CSM.mp4
1.5 MB
VoD 2020/4. Endpoint Security Architecture/11. Authentication/2. Authentication.mp4
1.5 MB
VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/8. Magic Local Admin.mp4
1.5 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/17. TheHive.mp4
1.5 MB
VoD 2020/3. Network Security Monitoring/5. NIDS Design/5. Blacklisting Is a Failed Approach.mp4
1.5 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/2. Traditional Cyber Defense.mp4
1.5 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/11. Critical Event 2 Service Creation.mp4
1.5 MB
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/2. Application Monitoring.mp4
1.5 MB
VoD 2020/4. Endpoint Security Architecture/12. Security Support Provider/6. Microsoft Live Accounts LiveSSP.mp4
1.5 MB
VoD 2020/4. Endpoint Security Architecture/11. Authentication/3. Passwords.mp4
1.4 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/2. OpportunisticHobbyist Attackers.mp4
1.4 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/2. Adversary Informed Detection.mp4
1.4 MB
VoD 2020/3. Network Security Monitoring/14. Tracking Encryption Certificates/3. Public Key Certificates.mp4
1.4 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/7. Typical Flow of Executables.mp4
1.4 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/39. Critical Event 10 AppLocker Alerts.mp4
1.4 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/17. A Word on Scripting and Automation.mp4
1.4 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/10. Continuous Security Monitoring CSM.mp4
1.4 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/1. Course Roadmap 1.mp4
1.4 MB
VoD 2020/5. Automation and Continuous Security Monitoring/15. Section 5 Summary/1. Course Roadmap.mp4
1.4 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/6. Exporting Event Logs.mp4
1.4 MB
VoD 2020/2. Network Security Architecture/5. Forward Proxies/10. Beyond Website Categorization.mp4
1.4 MB
VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/11. NotPetya Effects on Maersk.mp4
1.4 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/1. Course Roadmap.mp4
1.4 MB
VoD 2020/3. Network Security Monitoring/9. Cornerstone NSM/3. ClientSide Exploits.mp4
1.4 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/9. Evil Executable Propagation.mp4
1.4 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/16. Hybrid SOC.mp4
1.4 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/2. Information Overload.mp4
1.4 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/2. Table of Contents 1.mp4
1.4 MB
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/15. Use Case Petya.mp4
1.4 MB
VoD 2020/2. Network Security Architecture/15. Threat Intelligence/10. VirusTotal.mp4
1.4 MB
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/12. Defensible Executable Transfers.mp4
1.3 MB
VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/10. NotPetya Effects on Ukraine.mp4
1.3 MB
VoD 2020/2. Network Security Architecture/5. Forward Proxies/13. Forward Proxy vs Scenario 2 Client Detection.mp4
1.3 MB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/20. Scenario 1 Web Application Attack Key Points.mp4
1.3 MB
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/9. ASD Mitigation Strategy HostBased IDS.mp4
1.3 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/20. SEC511 and Security Operations.mp4
1.3 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/3. Adversarial Dominance/3. No End in Sight.mp4
1.3 MB
VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/10. Nmap.mp4
1.3 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/5. Encryptions Effects on Exfiltration.mp4
1.3 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/11. ZoneIdentifier.mp4
1.3 MB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/21. Alert Data.mp4
1.3 MB
VoD 2020/4. Endpoint Security Architecture/13. PostAuthentication/5. Token Impersonation Levels.mp4
1.3 MB
VoD 2020/2. Network Security Architecture/8. Network Intrusion Prevention Systems/4. NIPS and Detection vs Scenario 12.mp4
1.3 MB
VoD 2020/2. Network Security Architecture/2. Routers/11. Routers Action Items.mp4
1.3 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/15. Data Analysis.mp4
1.3 MB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/18. Exploitation SQL Injection in Web Application.mp4
1.3 MB
VoD 2020/5. Automation and Continuous Security Monitoring/4. Maintaining Situational Awareness/3. Useful Sites.mp4
1.3 MB
VoD 2020/3. Network Security Monitoring/5. NIDS Design/1. Course Roadmap.mp4
1.3 MB
VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/12. Beyond Vendors and CIS.mp4
1.3 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/14. How Does This Differ from Normal PsExec.mp4
1.3 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/4. DetectionOriented.mp4
1.2 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/40. Critical Event 11 EMET Alerts.mp4
1.2 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/3. Adversarial Dominance/1. Course Roadmap.mp4
1.2 MB
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/6. Default WDFAS.mp4
1.2 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/22. Phase 1 Duration.mp4
1.2 MB
VoD 2020/2. Network Security Architecture/13. Adversary Deception Devices/3. HoneypotsHoneynets.mp4
1.2 MB
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/10. CIS 12 Boundary Defense.mp4
1.2 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/18. NIST Special Publication 800167 Guide to Application Whitelisting.mp4
1.2 MB
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/5. Practical Issues How to Sniff.mp4
1.2 MB
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/16. ZeekBro Network Security Monitor.mp4
1.2 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/7. PostExploitation Activity Is Key.mp4
1.2 MB
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/14. DeepBlue CLI Base64 andor Compressed Commands.mp4
1.2 MB
VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/2. NextGeneration Firewalls NGFW.mp4
1.2 MB
VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/13. LUA Buglight.mp4
1.2 MB
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/8. Microsoft Sysinternals Sysmon.mp4
1.2 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/4. Intrusion Kill Chain.mp4
1.2 MB
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/4. What Does a Malicious Startup Registry Key Look Like.mp4
1.2 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/8. Detecting Malice via Windows Events.mp4
1.2 MB
VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/1. Course Roadmap 1.mp4
1.2 MB
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/14. NonDefensible and Suspicious Executable Flow.mp4
1.2 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/4. Not a SOC.mp4
1.2 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/20. dnscat2 The Results.mp4
1.2 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/8. ClientSide Targets/2. Common ClientSide Targets.mp4
1.2 MB
VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/3. CIS 87 Malware Defenses.mp4
1.2 MB
VoD 2020/2. Network Security Architecture/2. Routers/6. Abnormal Outbound Connections.mp4
1.1 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/42. Course Roadmap 2.mp4
1.1 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/30. Linux AppArmor.mp4
1.1 MB
VoD 2020/5. Automation and Continuous Security Monitoring/14. PostIntrusion Detection/1. Course Roadmap.mp4
1.1 MB
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/9. Then Automate.mp4
1.1 MB
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/5. FIPS 199 on SBU Classification.mp4
1.1 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/8. ClientSide Targets/1. Course Roadmap.mp4
1.1 MB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/17. Mapping Web Server Located via Targeted DNS.mp4
1.1 MB
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/13. NIST Special Publication 800137.mp4
1.1 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/25. Trusted Binaries.mp4
1.1 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/19. dnscat2 Spotting with ZeekBro.mp4
1.1 MB
VoD 2020/3. Network Security Monitoring/14. Tracking Encryption Certificates/6. Normal X509 issuer Fields.mp4
1.1 MB
VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/6. Invisibility Analysis IDS and Trust.mp4
1.1 MB
VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/2. Perimeter SI Firewalls.mp4
1.1 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/23. Iodine Show Me the NULL ZeekBro.mp4
1.1 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/8. ClientSide Targets/8. File Format Attacks.mp4
1.1 MB
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/3. Why Is This Important.mp4
1.1 MB
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/7. The US Government and Continuous Monitoring.mp4
1.1 MB
VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/9. No More UAC Bypassing Magic Admin.mp4
1.0 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/22. Tracking Changes to Domain Groups.mp4
1.0 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/29. Advanced Application Whitelisting.mp4
1.0 MB
VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/10. Vendor Guides.mp4
1.0 MB
VoD 2020/2. Network Security Architecture/15. Threat Intelligence/7. Dirty Word List DWL.mp4
1.0 MB
VoD 2020/2. Network Security Architecture/15. Threat Intelligence/12. URL Analysis.mp4
1.0 MB
VoD 2020/3. Network Security Monitoring/13. C2 via HTTPS/8. Malicious HTTPS.mp4
1.0 MB
VoD 2020/3. Network Security Monitoring/14. Tracking Encryption Certificates/1. Course Roadmap.mp4
1.0 MB
VoD 2020/2. Network Security Architecture/2. Routers/13. Routers vs Scenario 1 Web App Detection.mp4
1.0 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/2. ClientSide Vectors.mp4
1.0 MB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/26. Correlated Data.mp4
1.0 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/14. Minnows 2.mp4
1.0 MB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/23. Scenario 2 Watering Hole ClientSide Pivot 3.mp4
999.9 kB
VoD 2020/3. Network Security Monitoring/5. NIDS Design/10. Historical Anomaly Design.mp4
998.2 kB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/9. Bots Gone Wild.mp4
992.6 kB
VoD 2020/3. Network Security Monitoring/9. Cornerstone NSM/6. ServiceSide Example.mp4
987.2 kB
VoD 2020/2. Network Security Architecture/14. SwitchesPVLAN Security/8. Internal SI Firewalls.mp4
982.6 kB
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/2. The NSM Toolbox.mp4
981.2 kB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/8. Pivoting Pictorially 2.mp4
973.9 kB
VoD 2020/3. Network Security Monitoring/13. C2 via HTTPS/11. Tor HTTPS.mp4
965.2 kB
VoD 2020/4. Endpoint Security Architecture/5. EMET and Windows Defender Exploit Guard/2. CIS 83 EnableDeploy AntiExploitation Technologies.mp4
963.9 kB
VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/8. NIDS and Prevention.mp4
958.2 kB
VoD 2020/5. Automation and Continuous Security Monitoring/10. Monitoring Change to Devices and Appliances/1. Course Roadmap.mp4
940.4 kB
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/10. Detecting Change.mp4
938.2 kB
VoD 2020/4. Endpoint Security Architecture/14. Advanced Authentication Attacks/7. This Dog Can Hunt.mp4
926.0 kB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/16. Recon Build a Targeted Wordlist.mp4
911.4 kB
VoD 2020/5. Automation and Continuous Security Monitoring/8. Monitoring Patching/2. Monitoring Patching.mp4
909.5 kB
VoD 2020/2. Network Security Architecture/2. Routers/12. Routers vs Scenario 1 Web App Prevention.mp4
908.2 kB
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/7. PowerShell Logging.mp4
899.4 kB
VoD 2020/3. Network Security Monitoring/5. NIDS Design/13. There Is No Easy Button.mp4
898.0 kB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/3. DataDriven.mp4
886.6 kB
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/2. Practical NSM Issues.mp4
878.5 kB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/21. Scenario 2 Watering Hole ClientSide Pivot 1.mp4
877.2 kB
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/6. Remotely Accessing Registry Keys.mp4
876.3 kB
VoD 2020/2. Network Security Architecture/2. Routers/1. Course Roadmap.mp4
862.1 kB
VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/5. Loser PowerShell.mp4
857.1 kB
VoD 2020/4. Endpoint Security Architecture/12. Security Support Provider/5. WDigest FAIL.mp4
850.3 kB
VoD 2020/3. Network Security Monitoring/13. C2 via HTTPS/1. Course Roadmap.mp4
841.3 kB
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/12. NIST SP 800137.mp4
834.0 kB
VoD 2020/5. Automation and Continuous Security Monitoring/6. Passive OS Detection/6. Raw PRADS Log View in Gnumeric Spreadsheet.mp4
826.3 kB
VoD 2020/2. Network Security Architecture/15. Threat Intelligence/1. Course Roadmap.mp4
812.7 kB
VoD 2020/2. Network Security Architecture/2. Routers/15. Routers vs Scenario 2 Client Detection.mp4
811.2 kB
VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/9. NGFW vs Scenario 1 Web App.mp4
806.0 kB
VoD 2020/3. Network Security Monitoring/9. Cornerstone NSM/1. Course Roadmap 1.mp4
798.6 kB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/21. Event Viewer Security Log View net localgroup administrators sec511 add.mp4
792.5 kB
VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/1. Course Roadmap.mp4
788.9 kB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/36. Attacker View Metasploit PsExec PasstheHash 2.mp4
782.1 kB
VoD 2020/4. Endpoint Security Architecture/14. Advanced Authentication Attacks/8. WhackaMole.mp4
777.0 kB
VoD 2020/3. Network Security Monitoring/9. Cornerstone NSM/7. Course Roadmap 2.mp4
775.8 kB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/1. Course Roadmap.mp4
774.6 kB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/2. CIS 27 Utilize Application Whitelisting.mp4
772.5 kB
VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/8. Active Scanning.mp4
766.0 kB
VoD 2020/2. Network Security Architecture/8. Network Intrusion Prevention Systems/5. NIPS vs Scenario 1 Web App Prevention.mp4
763.9 kB
VoD 2020/3. Network Security Monitoring/13. C2 via HTTPS/2. C2 via HTTPS.mp4
760.7 kB
VoD 2020/3. Network Security Monitoring/12. Tracking User Agents/1. Course Roadmap.mp4
746.3 kB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/12. Cryptolocker Screenshot.mp4
742.4 kB
VoD 2020/5. Automation and Continuous Security Monitoring/2. Industry Best Practices/7. ASD Essential Eight Limit Extent of Incidents.mp4
737.1 kB
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/11. Bejtlich on CDM.mp4
726.2 kB
VoD 2020/4. Endpoint Security Architecture/5. EMET and Windows Defender Exploit Guard/1. Course Roadmap.mp4
709.5 kB
VoD 2020/2. Network Security Architecture/8. Network Intrusion Prevention Systems/6. NIPS vs Scenario 2 Client Prevention.mp4
696.3 kB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/1. Course Roadmap.mp4
694.5 kB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/3. Application Whitelisting.mp4
685.6 kB
VoD 2020/4. Endpoint Security Architecture/13. PostAuthentication/1. Course Roadmap.mp4
685.5 kB
VoD 2020/4. Endpoint Security Architecture/12. Security Support Provider/1. Course Roadmap.mp4
681.9 kB
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/16. AnomalyBased Detection Is Hard Right.mp4
681.7 kB
VoD 2020/4. Endpoint Security Architecture/12. Security Support Provider/8. Lets Try That Again.mp4
667.4 kB
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/9. Spot the Anomaly.mp4
665.6 kB
VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/3. CIS 129 Boundary Defense.mp4
660.3 kB
VoD 2020/2. Network Security Architecture/15. Threat Intelligence/11. Evading AV or AllClear.mp4
651.7 kB
VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/1. Course Roadmap.mp4
636.8 kB
VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/11. Process Monitor Access Denied.mp4
633.7 kB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/3. Current State Industry Studies.mp4
626.3 kB
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/15. NIST SP 800137 What to Do Not How to Do It.mp4
625.0 kB
VoD 2020/4. Endpoint Security Architecture/2. Windows Endpoints/2. What We Cover.mp4
620.1 kB
VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/1. Course Roadmap.mp4
616.5 kB
VoD 2020/4. Endpoint Security Architecture/13. PostAuthentication/6. Impersonate Tokens.mp4
616.2 kB
VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/12. Course Roadmap 2.mp4
600.8 kB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/20. Statistical Data.mp4
600.7 kB
VoD 2020/4. Endpoint Security Architecture/3. Patching/1. Course Roadmap.mp4
598.1 kB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/6. Modern Attack Techniques/1. Course Roadmap.mp4
594.0 kB
VoD 2020/5. Automation and Continuous Security Monitoring/2. Industry Best Practices/1. Course Roadmap.mp4
589.4 kB
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/1. Course Roadmap.mp4
576.4 kB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/4. Course Roadmap.mp4
573.4 kB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/13. Phase 0 Whitelist Building.mp4
568.7 kB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/34. AppLocker Phase 1 Audit Only.mp4
567.9 kB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/1. Course Roadmap 1.mp4
566.7 kB
VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/1. Course Roadmap 1.mp4
560.5 kB
VoD 2020/4. Endpoint Security Architecture/14. Advanced Authentication Attacks/1. Course Roadmap.mp4
554.0 kB
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/15. Detecting Stage 2 Downloads.mp4
550.8 kB
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/13. NSM Toolbox NIDS.mp4
531.6 kB
VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/1. Course Roadmap 1.mp4
528.1 kB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/15. Daily Immersive Cyber Challenges.mp4
525.8 kB
VoD 2020/5. Automation and Continuous Security Monitoring/10. Monitoring Change to Devices and Appliances/5. HowTo Configuration Change Notification and Logging.mp4
517.6 kB
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/1. Course Roadmap.mp4
510.9 kB
VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/7. Enable Query Logging on Bind 9.mp4
496.2 kB
VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/1. Course Roadmap.mp4
492.9 kB
VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/4. Inventory and Control of Hardware Assets.mp4
486.6 kB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/13. The BSG Threat Hunting Team.mp4
484.4 kB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/25. Example of a Tagged Rule.mp4
482.2 kB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/10. Wireshark ICMP Example.mp4
481.6 kB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/3. NSM Data Sources 2.mp4
476.2 kB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/27. Course Roadmap 2.mp4
474.2 kB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/1. Course Roadmap 1.mp4
473.7 kB
VoD 2020/2. Network Security Architecture/12. Security Information and Event Management SIEM/1. Course Roadmap.mp4
471.7 kB
VoD 2020/5. Automation and Continuous Security Monitoring/6. Passive OS Detection/7. Lets Clean That Up a Bit.mp4
466.1 kB
VoD 2020/3. Network Security Monitoring/9. Cornerstone NSM/4. ClientSide Example.mp4
459.6 kB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/1. Course Roadmap.mp4
451.6 kB
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/2. Winning CSM Techniques.mp4
446.2 kB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/17. Courseware Conventions.mp4
407.1 kB
VoD 2020/3. Network Security Monitoring/9. Cornerstone NSM/2. Cornerstone NSM.mp4
371.8 kB
VoD 2020/2. Network Security Architecture/4. Web Application Firewalls/9. WAF vs Scenario 2 Client PreventionDetection.mp4
323.3 kB
VoD 2020/2. Network Security Architecture/12. Security Information and Event Management SIEM/8. SIEM and Prevention.mp4
308.7 kB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/35. Audit Only Mode.mp4
293.5 kB
VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/4. Privileged Accounts.mp4
287.3 kB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/26. Exploitation ClientSide Exploitation.mp4
285.8 kB
VoD 2020/3. Network Security Monitoring/14. Tracking Encryption Certificates/9. Our Approach on the Contagio Crimeware Pcap Collection.mp4
283.4 kB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/2. Modern Cyber Defense Principles.mp4
269.9 kB
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/4. EPP HostBased Firewall CIS 94.mp4
196.6 kB
VoD 2020/3. Network Security Monitoring/5. NIDS Design/7. Answer Not Many.mp4
167.5 kB
VoD 2020/3. Network Security Monitoring/2. Network Security Monitoring Overview/1. Course Roadmap.mp4
167.2 kB
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/1. Course Roadmap.mp4
165.8 kB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/1. Course Roadmap 1.mp4
165.6 kB
VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/1. Course Roadmap.mp4
161.0 kB
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/19. Course Roadmap 2.mp4
148.9 kB
VoD 2020/4. Endpoint Security Architecture/16. Section 4 Summary/4. Course Roadmap 2.mp4
148.0 kB
VoD 2020/2. Network Security Architecture/14. SwitchesPVLAN Security/3. IPFIXNetFlow.mp4
146.1 kB
VoD 2020/4. Endpoint Security Architecture/1. Endpoint Security Architecture Overview/4. Course Roadmap.mp4
144.3 kB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/11. Course Roadmap 2.mp4
143.1 kB
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/8. Course Roadmap 2.mp4
142.3 kB
VoD 2020/4. Endpoint Security Architecture/2. Windows Endpoints/1. Course Roadmap.mp4
141.8 kB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/1. Course Roadmap.mp4
141.4 kB
VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/1. Appendix Centralize Windows Event Logs MBSA.mp4
141.3 kB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/10. Course Roadmap 2.mp4
140.2 kB
VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/1. Course Roadmap.mp4
139.6 kB
VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/12. Course Roadmap 2.mp4
139.2 kB
VoD 2020/5. Automation and Continuous Security Monitoring/4. Maintaining Situational Awareness/1. Course Roadmap.mp4
139.0 kB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/23. Course Roadmap 2.mp4
138.6 kB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/15. Wireshark.mp4
138.2 kB
VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/11. Course Roadmap 2.mp4
137.7 kB
VoD 2020/5. Automation and Continuous Security Monitoring/7. Vulnerability Scanning/1. Course Roadmap.mp4
137.5 kB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/14. Scenario 1 The Ambitious Lt Gaeta.mp4
136.9 kB
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/4. Course Roadmap.mp4
135.8 kB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/14. The Sguil NSM Frontend.mp4
133.5 kB
VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/10. SI Firewall vs Scenario 1 Web App Detection.mp4
133.1 kB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/22. Scenario 2 Watering Hole ClientSide Pivot 2.mp4
130.5 kB
VoD 2020/2. Network Security Architecture/8. Network Intrusion Prevention Systems/1. Course Roadmap.mp4
125.8 kB
VoD 2020/2. Network Security Architecture/4. Web Application Firewalls/10. Course Roadmap 2.mp4
125.7 kB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/13. Section One Summary/1. Course Roadmap 1.mp4
123.6 kB
VoD 2020/2. Network Security Architecture/16. Section Two Summary/4. Course Roadmap 2.mp4
123.5 kB
VoD 2020/5. Automation and Continuous Security Monitoring/6. Passive OS Detection/9. Course Roadmap 2.mp4
122.4 kB
VoD 2020/2. Network Security Architecture/6. Encryption and TLS Inspection/1. Course Roadmap.mp4
122.3 kB
VoD 2020/3. Network Security Monitoring/1. Getting Started/4. Course Roadmap.mp4
121.7 kB
VoD 2020/3. Network Security Monitoring/15. SectionThree Summary/1. Course Roadmap.mp4
120.4 kB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/30. Scenario 2 ClientSide Pivot Key Points.mp4
118.6 kB
VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/7. Add Computers to Groups.mp4
117.2 kB
VoD 2020/4. Endpoint Security Architecture/16. Section 4 Summary/3. Day 4 TLDR.mp4
117.2 kB
VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/4. Configuring Centralized Logging 1.mp4
117.0 kB
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/16. Spring Time Difference Between NYC London and Sydney 1.mp4
117.0 kB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/13. Section One Summary/3. Day 1 TLDR.mp4
116.6 kB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/11. Instructor Demo Exercise 11 and 5113 Preview.mp4
116.0 kB
VoD 2020/4. Endpoint Security Architecture/16. Section 4 Summary/2. Day 4 Punch ListAction Items.mp4
115.7 kB
VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/6. Create Two Groups.mp4
114.5 kB
VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/3. Collectors and Sources.mp4
112.9 kB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/15. Summary.mp4
112.0 kB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/13. Sguil.mp4
111.4 kB
VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/2. Configuring Centralized Windows Event Log Collection.mp4
107.3 kB
VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/5. Configuring Centralized Logging 2.mp4
104.0 kB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/13. Section One Summary/2. Day 1 Punch ListAction Items.mp4
101.9 kB
VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/12. Complete Subscription.mp4
95.4 kB
VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/8. Windows Remote Management.mp4
93.9 kB
VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/9. Enable the Windows Event Collector.mp4
93.7 kB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/5. Main Topics Covered in SEC511.mp4
91.7 kB
VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/13. Default Windows Vista and Newer Settings.mp4
88.0 kB
VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/10. Creating the Subscription in Event Viewer.mp4
84.0 kB
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/3. Table of Contents 2.mp4
80.8 kB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/22. SEC511 Portal Electronic Labs.mp4
79.2 kB
VoD 2020/4. Endpoint Security Architecture/1. Endpoint Security Architecture Overview/3. Table of Contents 2.mp4
78.3 kB
VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/11. Choose Events.mp4
77.7 kB
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/17. The Long Tail 2.mp4
74.1 kB
VoD 2020/3. Network Security Monitoring/15. SectionThree Summary/5. Thank you.mp4
73.7 kB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/21. SEC511 Portal Landing Page.mp4
71.9 kB
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/11. NSM Sensor Placement.mp4
68.0 kB
VoD 2020/5. Automation and Continuous Security Monitoring/15. Section 5 Summary/5. Thank You.mp4
66.9 kB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/3. Table of Contents 2.mp4
64.9 kB
VoD 2020/5. Automation and Continuous Security Monitoring/15. Section 5 Summary/4. SEC511 Daily NetWars.mp4
58.2 kB
VoD 2020/4. Endpoint Security Architecture/16. Section 4 Summary/6. SEC511 Daily NetWars.mp4
57.7 kB
VoD 2020/3. Network Security Monitoring/15. SectionThree Summary/4. SEC511 Daily NetWars.mp4
57.5 kB
VoD 2020/2. Network Security Architecture/16. Section Two Summary/6. SEC511 Daily NetWars.mp4
57.4 kB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/13. Section One Summary/6. SEC511 Daily NetWars.mp4
57.3 kB
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!
>