MuerBT磁力搜索 BT种子搜索利器 免费下载BT种子,超5000万条种子数据

SANS 450 - Blue team fundamentals

磁力链接/BT种子名称

SANS 450 - Blue team fundamentals

磁力链接/BT种子简介

种子哈希:bc5ff400861123a7af5f101f7951a4b842e7fdcf
文件大小: 33.99G
已经下载:1166次
下载速度:极快
收录时间:2024-01-06
最近下载:2026-01-05

移花宫入口

移花宫.com邀月.com怜星.com花无缺.comyhgbt.icuyhgbt.top

磁力链接下载

magnet:?xt=urn:btih:BC5FF400861123A7AF5F101F7951A4B842E7FDCF
推荐使用PIKPAK网盘下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看

下载BT种子文件

磁力链接 迅雷下载 PIKPAK在线播放 世界之窗 小蓝俱乐部 含羞草 欲漫涩 逼哩逼哩 成人快手 51品茶 母狗园 51动漫 91短视频 抖音Max 海王TV TikTok成人版 PornHub 暗网Xvideo 草榴社区 哆哔涩漫 呦乐园 萝莉岛 搜同 91暗网

最近搜索

细腰蜜桃臀尤物身材御姐享受变态性爱 曹长卿 sdab-289 kelly+collins+-+kamy-ultrafilms+-+starlight 特写 mdbt2.com 失恋侄子心情不好想要巨乳小姨安慰 学霸妹妹 雨竹先生 私房最新流出黑客【破解摄像头】隆乳整形诊所+家居视频+妇科检查 当着孩子 松川奈奈子 人气艳星顶级媚黑犹如她手臂粗的大黑棍 fc2-ppv-3743390 鸭哥返场极品牛仔裤小萝莉,身材玲珑有致 snis-804 极品高颜值情趣丁字裤美女被男友各种爆日 lexis 我内射你老婆你却只能在事后用嘴清理战场 離島幼女 【weagogo】肛交+ cla314 家族 大学生私房 yuna+tamago+黑丝 爱泄密东北淫荡人妻偷情高潮嚎叫 全程骑乘 这就是招惹东 okad-370 kala.grey 悲伤恋歌 丝+高跟

文件列表

  • 2020/Sec450 Virtual Machine/Sec450 Virtual Machine.iso 17.1 GB
  • 2022/ISO/450.22.1.iso 15.4 GB
  • 2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_21_2.webm 65.1 MB
  • 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_22.webm 64.8 MB
  • 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_29.webm 64.1 MB
  • 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_31.webm 62.2 MB
  • 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_21_2.webm 53.1 MB
  • 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_26.webm 43.3 MB
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/pack/pack-8738db4f374c1f90340e72cd7592dc8a00d61e7d.pack 42.4 MB
  • 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand.webm 41.9 MB
  • 2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_15_2.webm 39.5 MB
  • 2020/Sec450 Video/Section 2/2.9 DAY 2 SUMMARY/SEC450- SANS OnDemand_4_2.webm 35.0 MB
  • 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_28.webm 34.6 MB
  • 2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_9.webm 32.6 MB
  • 2020/Sec450 PDF/SEC450 - Workbook.pdf 30.1 MB
  • 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_31_2.webm 28.3 MB
  • 2020/Sec450 Video/Section 1/1.9 DAY 1 SUMMARY/SEC450- SANS OnDemand_5.webm 26.3 MB
  • 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_19_2.webm 25.2 MB
  • 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_20.webm 25.0 MB
  • 2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_17.webm 21.7 MB
  • 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_21.webm 19.4 MB
  • 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_20.webm 19.1 MB
  • 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_11.webm 18.8 MB
  • 2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_17_2.webm 18.5 MB
  • 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_2.webm 18.4 MB
  • 2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand_3.webm 17.2 MB
  • 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_23.webm 16.4 MB
  • 2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand_7.webm 15.7 MB
  • 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_11.webm 15.5 MB
  • 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_20_2.webm 15.1 MB
  • 2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_5.webm 15.0 MB
  • 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_8.webm 14.8 MB
  • 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_16_2.webm 14.7 MB
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/pack/pack-a5835f7443762e31a13a10fffe23d05818565349.pack 14.6 MB
  • 2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_4_2.webm 14.6 MB
  • 2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_7_2.webm 14.1 MB
  • 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_13.webm 13.8 MB
  • 2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_15_2.webm 13.7 MB
  • 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_5_2.webm 13.5 MB
  • 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_14.webm 13.4 MB
  • 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_23.webm 13.3 MB
  • 2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_12_2.webm 13.3 MB
  • 2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_13.webm 13.2 MB
  • 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_7.webm 13.1 MB
  • 2022/PDF/SEC450 (2022)/SEC450 - Book 2 (2022).pdf 13.0 MB
  • 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_25.webm 12.8 MB
  • 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_19.webm 12.7 MB
  • 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_19.webm 12.2 MB
  • 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_7.webm 12.2 MB
  • 2020/Sec450 PDF/SEC450 - Book 2.pdf 12.2 MB
  • 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_18.webm 12.1 MB
  • 2022/PDF/SEC450 (2022)/SEC450 - Book 3 (2022).pdf 11.7 MB
  • 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_2.webm 11.6 MB
  • 2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_10.webm 11.5 MB
  • 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_20.webm 11.3 MB
  • 2020/Sec450 Video/Section 3/3.9 DAY 3 SUMMARY/SEC450- SANS OnDemand_3.webm 11.3 MB
  • 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_12.webm 11.3 MB
  • 2022/PDF/SEC450 (2022)/SEC450 - Book 5 (2022).pdf 11.3 MB
  • 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_10.webm 11.2 MB
  • 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_12_2.webm 11.0 MB
  • 2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_13_2.webm 11.0 MB
  • 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_10.webm 11.0 MB
  • 2020/Sec450 PDF/SEC450 - Book 5.pdf 10.9 MB
  • 2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_6.webm 10.9 MB
  • 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_17_2.webm 10.8 MB
  • 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_22_2.webm 10.8 MB
  • 2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_13_2.webm 10.6 MB
  • 2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_5_2.webm 10.5 MB
  • 2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_11.webm 10.5 MB
  • 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_13.webm 10.5 MB
  • 2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_15.webm 10.5 MB
  • 2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_11_2.webm 10.4 MB
  • 2022/PDF/SEC450 (2022)/SEC450 - Book 1 (2022).pdf 10.3 MB
  • 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_20.webm 10.3 MB
  • 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_8.webm 10.2 MB
  • 2020/Sec450 PDF/SEC450 - Book 3.pdf 10.2 MB
  • 2020/Sec450 PDF/SEC450 - Book 1.pdf 10.2 MB
  • 2022/PDF/SEC450 (2022)/SEC450 - Book 4 (2022).pdf 10.2 MB
  • 2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_7_2.webm 10.1 MB
  • 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_29.webm 10.1 MB
  • 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_8_2.webm 10.0 MB
  • 2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_2.webm 10.0 MB
  • 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_13.webm 10.0 MB
  • 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_17.webm 9.9 MB
  • 2020/Sec450 PDF/SEC450 - Book 4.pdf 9.8 MB
  • 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_13.webm 9.8 MB
  • 2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_12.webm 9.7 MB
  • 2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_15_2.webm 9.6 MB
  • 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_20.webm 9.5 MB
  • 2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_6_2.webm 9.4 MB
  • 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_10.webm 9.3 MB
  • 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_26.webm 9.3 MB
  • 2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_11_2.webm 9.2 MB
  • 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_18.webm 9.2 MB
  • 2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_9_2.webm 9.2 MB
  • 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_21.webm 9.1 MB
  • 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_6.webm 9.1 MB
  • 2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_8_2.webm 9.0 MB
  • 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_14.webm 9.0 MB
  • 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_21.webm 8.8 MB
  • 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_31.webm 8.8 MB
  • 2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_7_2.webm 8.8 MB
  • 2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_9.webm 8.8 MB
  • 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_14_3.webm 8.7 MB
  • 2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_10.webm 8.6 MB
  • 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_17.webm 8.4 MB
  • 2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_9_2.webm 8.4 MB
  • 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_19_2.webm 8.4 MB
  • 2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_4.webm 8.3 MB
  • 2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_8.webm 8.3 MB
  • 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_21_2.webm 8.3 MB
  • 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_19.webm 8.3 MB
  • 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_24.webm 8.2 MB
  • 2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_6.webm 8.2 MB
  • 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_18.webm 8.2 MB
  • 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_21_2.webm 8.2 MB
  • 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_15_2.webm 8.2 MB
  • 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_21.webm 8.1 MB
  • 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_17_2.webm 8.0 MB
  • 2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_18_2.webm 8.0 MB
  • 2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_14_2.webm 7.9 MB
  • 2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_16_2.webm 7.7 MB
  • 2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_14_2.webm 7.7 MB
  • 2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_13_2.webm 7.6 MB
  • 2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_15.webm 7.6 MB
  • 2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_2_2.webm 7.6 MB
  • 2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_3_2.webm 7.6 MB
  • 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_26.webm 7.6 MB
  • 2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_4.webm 7.5 MB
  • 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_22.webm 7.5 MB
  • 2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_17.webm 7.5 MB
  • 2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_8_2.webm 7.4 MB
  • 2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_14_2.webm 7.4 MB
  • 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_12.webm 7.4 MB
  • 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_18_2.webm 7.4 MB
  • 2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_6_2.webm 7.4 MB
  • 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_25.webm 7.4 MB
  • 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_20_2.webm 7.2 MB
  • 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_22.webm 7.2 MB
  • 2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand_10.webm 7.2 MB
  • 2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_6_2.webm 7.1 MB
  • 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_16_2.webm 7.1 MB
  • 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_6.webm 7.1 MB
  • 2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_7_2.webm 7.0 MB
  • 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_28.webm 7.0 MB
  • 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_18.webm 6.9 MB
  • 2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_20.webm 6.9 MB
  • 2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_5_2.webm 6.9 MB
  • 2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_8_2.webm 6.8 MB
  • 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_15.webm 6.8 MB
  • 2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_11_2.webm 6.8 MB
  • 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_11.webm 6.7 MB
  • 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_22.webm 6.7 MB
  • 2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_12.webm 6.7 MB
  • 2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_11.webm 6.7 MB
  • 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_19.webm 6.7 MB
  • 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_13_3.webm 6.7 MB
  • 2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_8_2.webm 6.7 MB
  • 2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_6.webm 6.7 MB
  • 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_5.webm 6.6 MB
  • 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_4.webm 6.6 MB
  • 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_22.webm 6.6 MB
  • 2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_14.webm 6.5 MB
  • 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_10.webm 6.5 MB
  • 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_11.webm 6.4 MB
  • 2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_6.webm 6.4 MB
  • 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_27.webm 6.4 MB
  • 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_12_2.webm 6.4 MB
  • 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_10_2.webm 6.4 MB
  • 2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_8.webm 6.3 MB
  • 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_12.webm 6.3 MB
  • 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_9_2.webm 6.3 MB
  • 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_18.webm 6.3 MB
  • 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_20_2.webm 6.2 MB
  • 2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_8_2.webm 6.2 MB
  • 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_11_2.webm 6.1 MB
  • 2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_6_2.webm 6.1 MB
  • 2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_12.webm 6.1 MB
  • 2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_5.webm 6.1 MB
  • 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_24.webm 6.0 MB
  • 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_14.webm 6.0 MB
  • 2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_4.webm 6.0 MB
  • 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_16.webm 6.0 MB
  • 2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand.webm 6.0 MB
  • 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_5.webm 5.9 MB
  • 2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_2.webm 5.9 MB
  • 2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_15_2.webm 5.9 MB
  • 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_14.webm 5.8 MB
  • 2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_10_2.webm 5.8 MB
  • 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_14_2.webm 5.8 MB
  • 2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_17.webm 5.7 MB
  • 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_8.webm 5.7 MB
  • 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_12_2.webm 5.7 MB
  • 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_14.webm 5.7 MB
  • 2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_2_2.webm 5.7 MB
  • 2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_11.webm 5.6 MB
  • 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_7_2.webm 5.6 MB
  • 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_13_2.webm 5.6 MB
  • 2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_11.webm 5.6 MB
  • 2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_15.webm 5.5 MB
  • 2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_10.webm 5.5 MB
  • 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_11.webm 5.5 MB
  • 2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_14_2.webm 5.5 MB
  • 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_23.webm 5.5 MB
  • 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_18.webm 5.5 MB
  • 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_8.webm 5.5 MB
  • 2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_3.webm 5.4 MB
  • 2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_20.webm 5.4 MB
  • 2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_17_2.webm 5.4 MB
  • 2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_3.webm 5.4 MB
  • 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_12.webm 5.4 MB
  • 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_13_2.webm 5.3 MB
  • 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_9_2.webm 5.3 MB
  • 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_23_2.webm 5.3 MB
  • 2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_11.webm 5.2 MB
  • 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_10_2.webm 5.2 MB
  • 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_19_2.webm 5.2 MB
  • 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_28.webm 5.2 MB
  • 2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_17.webm 5.2 MB
  • 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_10_2.webm 5.2 MB
  • 2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_10.webm 5.2 MB
  • 2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_21.webm 5.1 MB
  • 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_20.webm 5.1 MB
  • 2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_10_2.webm 5.0 MB
  • 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_4_2.webm 5.0 MB
  • 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_18_2.webm 5.0 MB
  • 2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_12.webm 5.0 MB
  • 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_19.webm 5.0 MB
  • 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_14_2.webm 5.0 MB
  • 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_18.webm 5.0 MB
  • 2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_9.webm 4.9 MB
  • 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_11_2.webm 4.9 MB
  • 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_4.webm 4.9 MB
  • 2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_7.webm 4.9 MB
  • 2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_3_2.webm 4.9 MB
  • 2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_7.webm 4.9 MB
  • 2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_19.webm 4.9 MB
  • 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_20.webm 4.9 MB
  • 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_17_2.webm 4.8 MB
  • 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_24.webm 4.8 MB
  • 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_6.webm 4.8 MB
  • 2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_15.webm 4.8 MB
  • 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_14_2.webm 4.8 MB
  • 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_12.webm 4.7 MB
  • 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_2.webm 4.7 MB
  • 2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_3.webm 4.7 MB
  • 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_8.webm 4.7 MB
  • 2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_2.webm 4.7 MB
  • 2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_4_2.webm 4.6 MB
  • 2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_10_2.webm 4.6 MB
  • 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_24_2.webm 4.6 MB
  • 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_3.webm 4.6 MB
  • 2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_11_2.webm 4.6 MB
  • 2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_8.webm 4.6 MB
  • 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_24.webm 4.6 MB
  • 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_20_2.webm 4.6 MB
  • 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_17_2.webm 4.6 MB
  • 2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_9.webm 4.5 MB
  • 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_17_2.webm 4.5 MB
  • 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_5_2.webm 4.5 MB
  • 2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_18_2.webm 4.5 MB
  • 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_13.webm 4.5 MB
  • 2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_7.webm 4.5 MB
  • 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_7.webm 4.4 MB
  • 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_22.webm 4.4 MB
  • 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_28.webm 4.4 MB
  • 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_7_2.webm 4.4 MB
  • 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_17.webm 4.4 MB
  • 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_11.webm 4.4 MB
  • 2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand_5.webm 4.4 MB
  • 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_12_2.webm 4.4 MB
  • 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_3_2.webm 4.4 MB
  • 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_12_2.webm 4.4 MB
  • 2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_5.webm 4.3 MB
  • 2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_11_2.webm 4.3 MB
  • 2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_19.webm 4.3 MB
  • 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_17_2.webm 4.3 MB
  • 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_32.webm 4.3 MB
  • 2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_15.webm 4.3 MB
  • 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_17.webm 4.2 MB
  • 2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_16_2.webm 4.2 MB
  • 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_15.webm 4.2 MB
  • 2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_4_2.webm 4.2 MB
  • 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_23.webm 4.2 MB
  • 2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_13.webm 4.2 MB
  • 2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_13_3.webm 4.2 MB
  • 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_21.webm 4.2 MB
  • 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_22.webm 4.2 MB
  • 2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_4_2.webm 4.2 MB
  • 2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_9.webm 4.1 MB
  • 2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_14.webm 4.1 MB
  • 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_21.webm 4.1 MB
  • 2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_13.webm 4.1 MB
  • 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_11_2.webm 4.1 MB
  • 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_8.webm 4.1 MB
  • 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_10.webm 4.1 MB
  • 2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_4_3.webm 4.1 MB
  • 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_15.webm 4.1 MB
  • 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_20_2.webm 4.0 MB
  • 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_22_2.webm 4.0 MB
  • 2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_12_2.webm 4.0 MB
  • 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_6.webm 4.0 MB
  • 2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_16.webm 4.0 MB
  • 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_4_2.webm 4.0 MB
  • 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_2_2.webm 4.0 MB
  • 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_15.webm 4.0 MB
  • 2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_3_2.webm 4.0 MB
  • 2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_6.webm 4.0 MB
  • 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_4.webm 4.0 MB
  • 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_4_2.webm 4.0 MB
  • 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_21.webm 3.9 MB
  • 2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_4.webm 3.9 MB
  • 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_23.webm 3.9 MB
  • 2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand_4.webm 3.9 MB
  • 2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_14_2.webm 3.9 MB
  • 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_8_2.webm 3.9 MB
  • 2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_16_2.webm 3.9 MB
  • 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_21_2.webm 3.9 MB
  • 2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_10.webm 3.9 MB
  • 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_12.webm 3.9 MB
  • 2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_9_2.webm 3.8 MB
  • 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_8_2.webm 3.8 MB
  • 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_21_2.webm 3.8 MB
  • 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_26.webm 3.8 MB
  • 2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand_9.webm 3.8 MB
  • 2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_9_2.webm 3.8 MB
  • 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_25.webm 3.8 MB
  • 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_17.webm 3.8 MB
  • 2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_18.webm 3.7 MB
  • 2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_14.webm 3.7 MB
  • 2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_4.webm 3.7 MB
  • 2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_9.webm 3.7 MB
  • 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_24.webm 3.7 MB
  • 2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_10_2.webm 3.7 MB
  • 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_6.webm 3.7 MB
  • 2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_8_2.webm 3.7 MB
  • 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_9.webm 3.7 MB
  • 2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_7.webm 3.7 MB
  • 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_27.webm 3.7 MB
  • 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_10.webm 3.7 MB
  • 2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_7_2.webm 3.7 MB
  • 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_6.webm 3.6 MB
  • 2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_3_2.webm 3.6 MB
  • 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_16.webm 3.6 MB
  • 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_7.webm 3.6 MB
  • 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_21.webm 3.6 MB
  • 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_4_2.webm 3.6 MB
  • 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_11.webm 3.6 MB
  • 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_13.webm 3.6 MB
  • 2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_18.webm 3.5 MB
  • 2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_19_2.webm 3.5 MB
  • 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_4.webm 3.5 MB
  • 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_15.webm 3.5 MB
  • 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_23.webm 3.5 MB
  • 2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_3.webm 3.5 MB
  • 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_9_2.webm 3.5 MB
  • 2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_10_2.webm 3.5 MB
  • 2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_4.webm 3.5 MB
  • 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_8_2.webm 3.5 MB
  • 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_7_2.webm 3.5 MB
  • 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_14.webm 3.5 MB
  • 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_14_2.webm 3.5 MB
  • 2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_7_2.webm 3.5 MB
  • 2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_14_2.webm 3.4 MB
  • 2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_10_2.webm 3.4 MB
  • 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_11_2.webm 3.4 MB
  • 2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_12_2.webm 3.4 MB
  • 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_25_2.webm 3.4 MB
  • 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_15.webm 3.4 MB
  • 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_24_2.webm 3.4 MB
  • 2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_9_2.webm 3.4 MB
  • 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_31.webm 3.4 MB
  • 2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_18_2.webm 3.4 MB
  • 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_8.webm 3.4 MB
  • 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_18.webm 3.4 MB
  • 2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_16_2.webm 3.4 MB
  • 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_28_2.webm 3.3 MB
  • 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_18.webm 3.3 MB
  • 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_8.webm 3.3 MB
  • 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_10_2.webm 3.3 MB
  • 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_4_2.webm 3.3 MB
  • 2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_8_2.webm 3.3 MB
  • 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_9_2.webm 3.3 MB
  • 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_5_2.webm 3.2 MB
  • 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_5.webm 3.2 MB
  • 2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_17_2.webm 3.2 MB
  • 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_26.webm 3.2 MB
  • 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_23.webm 3.2 MB
  • 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_19_2.webm 3.2 MB
  • 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_30.webm 3.2 MB
  • 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_18_2.webm 3.2 MB
  • 2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_10.webm 3.2 MB
  • 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_24.webm 3.2 MB
  • 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_16_2.webm 3.2 MB
  • 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_7_2.webm 3.2 MB
  • 2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_5.webm 3.2 MB
  • 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_19.webm 3.2 MB
  • 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_13.webm 3.1 MB
  • 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_7_2.webm 3.1 MB
  • 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_16.webm 3.1 MB
  • 2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand_11.webm 3.1 MB
  • 2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_9_2.webm 3.1 MB
  • 2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_15_2.webm 3.1 MB
  • 2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_5_2.webm 3.1 MB
  • 2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_13_2.webm 3.1 MB
  • 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_15.webm 3.1 MB
  • 2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_12_2.webm 3.1 MB
  • 2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_11_2.webm 3.1 MB
  • 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_17.webm 3.1 MB
  • 2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_5_2.webm 3.1 MB
  • 2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_4_2.webm 3.1 MB
  • 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_4.webm 3.1 MB
  • 2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_18_2.webm 3.1 MB
  • 2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_6_2.webm 3.1 MB
  • 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_6_2.webm 3.1 MB
  • 2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_2_2.webm 3.1 MB
  • 2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_17.webm 3.1 MB
  • 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_20.webm 3.1 MB
  • 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_11_2.webm 3.0 MB
  • 2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_15_2.webm 3.0 MB
  • 2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_10.webm 3.0 MB
  • 2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_8.webm 3.0 MB
  • 2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_5_2.webm 3.0 MB
  • 2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_12_2.webm 3.0 MB
  • 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_14.webm 3.0 MB
  • 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_6_2.webm 3.0 MB
  • 2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_9_2.webm 3.0 MB
  • 2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_7.webm 3.0 MB
  • 2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_16.webm 3.0 MB
  • 2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_10_2.webm 3.0 MB
  • 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_14.webm 3.0 MB
  • 2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_5_2.webm 3.0 MB
  • 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_19.webm 3.0 MB
  • 2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_4_2.webm 3.0 MB
  • 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_14.webm 3.0 MB
  • 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_20.webm 3.0 MB
  • 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_25.webm 2.9 MB
  • 2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_11_2.webm 2.9 MB
  • 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_25.webm 2.9 MB
  • 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_22.webm 2.9 MB
  • 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_5_2.webm 2.9 MB
  • 2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_20_2.webm 2.9 MB
  • 2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_16.webm 2.9 MB
  • 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_15_2.webm 2.9 MB
  • 2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_6.webm 2.9 MB
  • 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_5_2.webm 2.9 MB
  • 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_18_2.webm 2.9 MB
  • 2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_14.webm 2.9 MB
  • 2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_20_2.webm 2.9 MB
  • 2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_14.webm 2.9 MB
  • 2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_10_2.webm 2.9 MB
  • 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_9.webm 2.9 MB
  • 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_14_2.webm 2.9 MB
  • 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_29.webm 2.8 MB
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/pack/pack-03bdfb6e4174a4f0d659f690a6368cd0960936e3.pack 2.8 MB
  • 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_9.webm 2.8 MB
  • 2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_4_2.webm 2.8 MB
  • 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_3_2.webm 2.8 MB
  • 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_3.webm 2.8 MB
  • 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_3.webm 2.8 MB
  • 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_7.webm 2.8 MB
  • 2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_13_2.webm 2.8 MB
  • 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_10.webm 2.8 MB
  • 2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_15_2.webm 2.8 MB
  • 2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_5.webm 2.8 MB
  • 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_4.webm 2.8 MB
  • 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_6_2.webm 2.8 MB
  • 2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_18.webm 2.8 MB
  • 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_23.webm 2.8 MB
  • 2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_19.webm 2.8 MB
  • 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_3_2.webm 2.8 MB
  • 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_14.webm 2.7 MB
  • 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_3_2.webm 2.7 MB
  • 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_4.webm 2.7 MB
  • 2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_6_2.webm 2.7 MB
  • 2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_3_2.webm 2.7 MB
  • 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_23.webm 2.7 MB
  • 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_5.webm 2.7 MB
  • 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_12.webm 2.7 MB
  • 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_3_2.webm 2.7 MB
  • 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_27.webm 2.7 MB
  • 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_27.webm 2.7 MB
  • 2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_6.webm 2.7 MB
  • 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_22_2.webm 2.7 MB
  • 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_10.webm 2.7 MB
  • 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_17.webm 2.7 MB
  • 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_10_2.webm 2.7 MB
  • 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_15_2.webm 2.7 MB
  • 2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_11_2.webm 2.7 MB
  • 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_30.webm 2.7 MB
  • 2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_7.webm 2.6 MB
  • 2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_2_2.webm 2.6 MB
  • 2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_16_2.webm 2.6 MB
  • 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_7_2.webm 2.6 MB
  • 2020/Sec450 Video/Section 1/1.9 DAY 1 SUMMARY/SEC450- SANS OnDemand_2.webm 2.6 MB
  • 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_10.webm 2.6 MB
  • 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_5_2.webm 2.6 MB
  • 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_2_2.webm 2.6 MB
  • 2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_13.webm 2.6 MB
  • 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_16.webm 2.6 MB
  • 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_17.webm 2.6 MB
  • 2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_7_2.webm 2.5 MB
  • 2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_2_2.webm 2.5 MB
  • 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_9.webm 2.5 MB
  • 2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_2.webm 2.5 MB
  • 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_13_2.webm 2.5 MB
  • 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_23.webm 2.5 MB
  • 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_15.webm 2.5 MB
  • 2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_7.webm 2.5 MB
  • 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_8_2.webm 2.5 MB
  • 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_15_2.webm 2.5 MB
  • 2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_12_2.webm 2.4 MB
  • 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_16.webm 2.4 MB
  • 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_4_3.webm 2.4 MB
  • 2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_19.webm 2.4 MB
  • 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_3_2.webm 2.4 MB
  • 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_10_2.webm 2.4 MB
  • 2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_13.webm 2.4 MB
  • 2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_12.webm 2.4 MB
  • 2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_7_2.webm 2.4 MB
  • 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_15.webm 2.4 MB
  • 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_5_2.webm 2.4 MB
  • 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_24.webm 2.4 MB
  • 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_16_2.webm 2.4 MB
  • 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_26_2.webm 2.4 MB
  • 2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_9_2.webm 2.4 MB
  • 2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_5.webm 2.4 MB
  • 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_11.webm 2.4 MB
  • 2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_2_2.webm 2.4 MB
  • 2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_4_2.webm 2.3 MB
  • 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_12.webm 2.3 MB
  • 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_29.webm 2.3 MB
  • 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_7.webm 2.3 MB
  • 2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_12.webm 2.3 MB
  • 2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_10_2.webm 2.3 MB
  • 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_18_2.webm 2.3 MB
  • 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_3.webm 2.3 MB
  • 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_18_2.webm 2.3 MB
  • 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_19.webm 2.3 MB
  • 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_19_2.webm 2.3 MB
  • 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_3.webm 2.2 MB
  • 2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_6_2.webm 2.2 MB
  • 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_11.webm 2.2 MB
  • 2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_3.webm 2.2 MB
  • 2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_13_2.webm 2.2 MB
  • 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_17.webm 2.2 MB
  • 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_16.webm 2.2 MB
  • 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_16.webm 2.2 MB
  • 2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_13.webm 2.2 MB
  • 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_10.webm 2.2 MB
  • 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_3.webm 2.2 MB
  • 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_5.webm 2.2 MB
  • 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_3_2.webm 2.1 MB
  • 2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_8_2.webm 2.1 MB
  • 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_16.webm 2.1 MB
  • 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_19.webm 2.1 MB
  • 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_22.webm 2.1 MB
  • 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_2_2.webm 2.1 MB
  • 2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_13_2.webm 2.1 MB
  • 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_16_2.webm 2.1 MB
  • 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_11_2.webm 2.1 MB
  • 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_22.webm 2.1 MB
  • 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_8.webm 2.1 MB
  • 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_6.webm 2.1 MB
  • 2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_21_2.webm 2.1 MB
  • 2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_13_2.webm 2.1 MB
  • 2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_10.webm 2.1 MB
  • 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_9.webm 2.1 MB
  • 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_9.webm 2.0 MB
  • 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_6.webm 2.0 MB
  • 2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_12_2.webm 2.0 MB
  • 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_17_2.webm 2.0 MB
  • 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_5.webm 2.0 MB
  • 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_26_3.webm 2.0 MB
  • 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_7.webm 2.0 MB
  • 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_16.webm 2.0 MB
  • 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_28.webm 2.0 MB
  • 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_14.webm 2.0 MB
  • 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_21.webm 2.0 MB
  • 2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_2.webm 2.0 MB
  • 2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_3_2.webm 2.0 MB
  • 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_20_2.webm 2.0 MB
  • 2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_14_2.webm 2.0 MB
  • 2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand_12.webm 2.0 MB
  • 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_15.webm 2.0 MB
  • 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_3_2.webm 2.0 MB
  • 2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_6_2.webm 2.0 MB
  • 2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_5_2.webm 1.9 MB
  • 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_10_2.webm 1.9 MB
  • 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_16_2.webm 1.9 MB
  • 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_15.webm 1.9 MB
  • 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_17.webm 1.9 MB
  • 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_20.webm 1.9 MB
  • 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_2.webm 1.9 MB
  • 2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_3_2.webm 1.9 MB
  • 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_24_2.webm 1.9 MB
  • 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_6.webm 1.9 MB
  • 2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_5_2.webm 1.9 MB
  • 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_9.webm 1.9 MB
  • 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_8.webm 1.9 MB
  • 2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_7_2.webm 1.9 MB
  • 2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_14_2.webm 1.9 MB
  • 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_11_2.webm 1.8 MB
  • 2020/Sec450 Video/Section 3/3.9 DAY 3 SUMMARY/SEC450- SANS OnDemand_2.webm 1.8 MB
  • 2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_11_2.webm 1.8 MB
  • 2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_7.webm 1.8 MB
  • 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_2.webm 1.8 MB
  • 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_13_2.webm 1.8 MB
  • 2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_13.webm 1.8 MB
  • 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_23_2.webm 1.8 MB
  • 2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_5.webm 1.8 MB
  • 2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_20_2.webm 1.8 MB
  • 2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_12.webm 1.8 MB
  • 2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_2_2.webm 1.8 MB
  • 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_22_2.webm 1.8 MB
  • 2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_9.webm 1.8 MB
  • 2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand_2.webm 1.8 MB
  • 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_26.webm 1.8 MB
  • 2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_4_2.webm 1.8 MB
  • 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_12_2.webm 1.8 MB
  • 2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_4_3.webm 1.8 MB
  • 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_14_2.webm 1.8 MB
  • 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_22.webm 1.7 MB
  • 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_17_2.webm 1.7 MB
  • 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_11.webm 1.7 MB
  • 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_9_2.webm 1.7 MB
  • 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_13_2.webm 1.7 MB
  • 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_4_2.webm 1.7 MB
  • 2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand_8.webm 1.7 MB
  • 2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_15.webm 1.7 MB
  • 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_8_2.webm 1.7 MB
  • 2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_6_2.webm 1.7 MB
  • 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand.webm 1.7 MB
  • 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_18.webm 1.7 MB
  • 2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_12_2.webm 1.7 MB
  • 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_2.webm 1.7 MB
  • 2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_11.webm 1.7 MB
  • 2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_12_2.webm 1.7 MB
  • 2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_13.webm 1.7 MB
  • 2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_8.webm 1.7 MB
  • 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_2_2.webm 1.7 MB
  • 2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_3_2.webm 1.6 MB
  • 2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_8.webm 1.6 MB
  • 2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_9.webm 1.6 MB
  • 2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_6.webm 1.6 MB
  • 2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_10_2.webm 1.6 MB
  • 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_25.webm 1.6 MB
  • 2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_30.webm 1.6 MB
  • 2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_2.webm 1.6 MB
  • 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_2_2.webm 1.6 MB
  • 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_7.webm 1.6 MB
  • 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_24.webm 1.6 MB
  • 2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_12.webm 1.6 MB
  • 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_6_2.webm 1.6 MB
  • 2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_2_2.webm 1.6 MB
  • 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_22_2.webm 1.5 MB
  • 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_6.webm 1.5 MB
  • 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_3.webm 1.5 MB
  • 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_22_2.webm 1.5 MB
  • 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_16.webm 1.5 MB
  • 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_2_2.webm 1.5 MB
  • 2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_17.webm 1.5 MB
  • 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_12_2.webm 1.5 MB
  • 2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_14.webm 1.5 MB
  • 2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_11.webm 1.5 MB
  • 2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_2_2.webm 1.5 MB
  • 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_18.webm 1.5 MB
  • 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_21_2.webm 1.5 MB
  • 2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_6_2.webm 1.5 MB
  • 2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_19_2.webm 1.5 MB
  • 2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_12.webm 1.5 MB
  • 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_9_2 (1).webm 1.5 MB
  • 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_9_2.webm 1.5 MB
  • 2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_15_2.webm 1.5 MB
  • 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_27.webm 1.5 MB
  • 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_13.webm 1.5 MB
  • 2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_3_2.webm 1.4 MB
  • 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_6_2.webm 1.4 MB
  • 2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_8_2.webm 1.4 MB
  • 2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_8_2.webm 1.4 MB
  • 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_11.webm 1.4 MB
  • 2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_15.webm 1.4 MB
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/pack/pack-90b4589ad74a56edf25af390111108b7a85dc922.pack 1.4 MB
  • 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_12.webm 1.4 MB
  • 2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_11_2.webm 1.4 MB
  • 2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_2.webm 1.4 MB
  • 2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_18.webm 1.4 MB
  • 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_4_2.webm 1.4 MB
  • 2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_19_2.webm 1.4 MB
  • 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_12.webm 1.4 MB
  • 2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_4_2.webm 1.4 MB
  • 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_29_2.webm 1.4 MB
  • 2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_5_2.webm 1.4 MB
  • 2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_8_2.webm 1.4 MB
  • 2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_17.webm 1.3 MB
  • 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_2.webm 1.3 MB
  • 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_15_2.webm 1.3 MB
  • 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_7_2.webm 1.3 MB
  • 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_22.webm 1.3 MB
  • 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_9.webm 1.3 MB
  • 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_6_2.webm 1.3 MB
  • 2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_11_2.webm 1.3 MB
  • 2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_2_2.webm 1.3 MB
  • 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand.webm 1.3 MB
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/pack/pack-1f71ccc745b2d328a7b9e0611be72e6f5869c7b5.pack 1.3 MB
  • 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_2_2.webm 1.3 MB
  • 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_9.webm 1.3 MB
  • 2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_2_2.webm 1.3 MB
  • 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_15_2.webm 1.3 MB
  • 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_2.webm 1.3 MB
  • 2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_19_2.webm 1.3 MB
  • 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_16_2.webm 1.3 MB
  • 2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_3.webm 1.3 MB
  • 2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_19.webm 1.3 MB
  • 2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_13_2.webm 1.3 MB
  • 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_6.webm 1.3 MB
  • 2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_17_2.webm 1.2 MB
  • 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_4_2.webm 1.2 MB
  • 2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_12_2.webm 1.2 MB
  • 2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_16.webm 1.2 MB
  • 2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_2.webm 1.2 MB
  • 2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_2_2.webm 1.2 MB
  • 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_12.webm 1.2 MB
  • 2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_9_2.webm 1.2 MB
  • 2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_5_2.webm 1.2 MB
  • 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_26.webm 1.2 MB
  • 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_25_2.webm 1.2 MB
  • 2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_8.webm 1.2 MB
  • 2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_11.webm 1.2 MB
  • 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_19.webm 1.2 MB
  • 2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_16.webm 1.2 MB
  • 2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_6_2.webm 1.2 MB
  • 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_23_2.webm 1.1 MB
  • 2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_5_2.webm 1.1 MB
  • 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_19_2.webm 1.1 MB
  • 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_7.webm 1.1 MB
  • 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_10.webm 1.1 MB
  • 2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_4_2.webm 1.1 MB
  • 2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_21.webm 1.1 MB
  • 2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_17_2.webm 1.1 MB
  • 2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_3_2.webm 1.1 MB
  • 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_24.webm 1.1 MB
  • 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_5.webm 1.1 MB
  • 2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand.webm 1.1 MB
  • 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_13_2.webm 1.0 MB
  • 2020/Sec450 Video/Section 2/2.9 DAY 2 SUMMARY/SEC450- SANS OnDemand_2_2.webm 1.0 MB
  • 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_2_2.webm 1.0 MB
  • 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_32.webm 1.0 MB
  • 2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_30.webm 1.0 MB
  • 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_23.webm 1.0 MB
  • 2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_12_2.webm 998.0 kB
  • 2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand_6.webm 997.4 kB
  • 2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_20.webm 995.5 kB
  • 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_9.webm 992.0 kB
  • 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_6_2.webm 988.3 kB
  • 2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_10_2.webm 974.1 kB
  • 2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_18.webm 973.3 kB
  • 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_5.webm 962.2 kB
  • 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_5.webm 960.4 kB
  • 2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_4.webm 957.5 kB
  • 2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_3.webm 947.8 kB
  • 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_9.webm 946.2 kB
  • 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_3.webm 919.0 kB
  • 2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_16.webm 917.0 kB
  • 2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_7_2.webm 904.1 kB
  • 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_15_2.webm 900.0 kB
  • 2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_13_2.webm 891.3 kB
  • 2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_14.webm 889.1 kB
  • 2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_6_2.webm 887.5 kB
  • 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_20.webm 884.0 kB
  • 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand.webm 882.8 kB
  • 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_28.webm 864.0 kB
  • 2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_7.webm 859.3 kB
  • 2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_16.webm 857.4 kB
  • 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_13_2.webm 852.1 kB
  • 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_27_2.webm 848.0 kB
  • 2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_8.webm 845.1 kB
  • 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_9_2.webm 841.8 kB
  • 2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_19.webm 839.0 kB
  • 2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_9_2.webm 827.8 kB
  • 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_7.webm 823.2 kB
  • 2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_13_2.webm 819.5 kB
  • 2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_14_2.webm 782.7 kB
  • 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_19_2.webm 774.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/search/search_index.json 757.1 kB
  • 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_19.webm 754.2 kB
  • 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_8.webm 750.8 kB
  • 2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_29.webm 739.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/vt-capable.png 738.6 kB
  • 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_7.webm 721.3 kB
  • 2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_11.webm 690.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image02.png 687.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/wordcut.js 677.5 kB
  • 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_13.webm 674.1 kB
  • 2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_7_2.webm 673.5 kB
  • 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_2.webm 655.0 kB
  • 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_3.webm 631.7 kB
  • 2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_9_2.webm 605.0 kB
  • 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand.webm 578.7 kB
  • 2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_14.webm 557.0 kB
  • 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_24.webm 555.3 kB
  • 2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_9.webm 551.9 kB
  • 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_16.webm 535.8 kB
  • 2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand.webm 529.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/bundle.c44cc438.min.js.map 527.2 kB
  • 2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_3.webm 519.8 kB
  • 2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_4.webm 460.2 kB
  • 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_32.webm 458.0 kB
  • 2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand.webm 449.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image10.png 434.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image05.png 417.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/rubeusinput.png 412.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path3/covenant/s4u.png 408.7 kB
  • 2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_6.webm 387.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/copied-it.png 373.6 kB
  • 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_8_2.webm 371.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor4/covenant/whiskersuccess.png 366.0 kB
  • 2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_8.webm 340.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/formatting.png 331.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image09.png 322.8 kB
  • 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_21.webm 321.8 kB
  • 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_29.webm 316.0 kB
  • 2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_10.webm 314.1 kB
  • 2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand.webm 312.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image06.png 305.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/resources/img/virtual-machine-credentials/virtual-machine-information-panel-fusion.png 305.2 kB
  • 2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_16.webm 301.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/empire/certpem.png 301.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image10.png 298.5 kB
  • 2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_15.webm 297.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/covenant/ticket.png 296.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/gui-replication.png 294.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/fgpwpol-adexplorer.png 288.7 kB
  • 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_13.webm 285.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/covenant/rubeus.png 283.4 kB
  • 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand.webm 277.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/LAPS-ADExplorer.png 276.4 kB
  • 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand.webm 274.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/webpage.png 269.3 kB
  • 2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_4_2.webm 266.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image09.png 266.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/image03.png 265.8 kB
  • 2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_17.webm 262.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor4/covenant/ntlm.png 262.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image04.png 261.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adexplorer-gmsa.png 259.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image15.png 255.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adexplorer-pwpol.png 255.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/asktgt2.png 253.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/image05.png 242.8 kB
  • 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand.webm 237.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image08.png 234.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/snmp.png 233.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adexplorer-computeraccounts.png 231.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image07.png 231.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image12.png 229.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image08.png 228.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/image08.png 227.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor1/empire/kerberoast-ticket.png 227.0 kB
  • 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_4.webm 226.0 kB
  • 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_25.webm 224.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adexplorerusers.png 223.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image23.png 221.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image22.png 217.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image21.png 217.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/ptt.png 216.4 kB
  • 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_25.webm 215.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image00.png 211.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image05.png 209.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/5/media/image02.png 208.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/GPO-RSAT.png 206.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/covenant/ticket.png 205.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/covenant/cracked.png 202.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image18.png 201.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/ticket.png 201.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/fgpwpol-rsat1.png 201.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image04.png 198.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/covenant/ptt.png 197.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/neo4j.png 194.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image14.png 194.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/resources/img/webshell.png 193.0 kB
  • 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_29.webm 192.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image19.png 191.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor4/empire/ntlm.png 189.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/rdp-success.PNG 187.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/pivot1-ifconfig.png 186.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/pivot1-ifconfig.png 186.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/jumphost.png 185.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/sharpview-groupenum.png 184.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/workbook.png 179.8 kB
  • 2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand.webm 179.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/image05.png 175.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image24.png 175.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/workers/search.5e67fbfe.min.js.map 173.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/output.png 172.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor1/covenant/roast.png 172.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/GPO-RSAT2.png 171.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/wireshark-encrypted.png 170.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image26.png 170.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image14.png 170.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/ssh-bastion.png 169.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/93/3b9823bd803b0e52d60d26505b12ddb500a6fe 167.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/26/a2ff5efa99622c7bf7d8b6853885fc3af41cd3 166.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/3c/4617241c5a0ddbb53b50fc62b7a346549cd939 166.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image02.png 163.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/krbtgt.png 160.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/ssh-bastion.png 159.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/ftp-get-key.png 157.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image11.png 157.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/fit-window.png 156.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/certgen.png 156.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/covenant/tgt.png 156.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image01.png 155.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/covenant/hraccess.png 155.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image29.png 154.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image09.png 153.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/covenant/dcsync.png 153.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor3/covenant/dcsync.png 152.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/computermmc.png 152.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/wireshark-base64.png 151.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/displays.png 149.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image02.png 149.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image02.png 149.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/RSAT-pwpol.png 148.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/1/media/image08.png 147.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/krbtgt.png 147.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image15.png 147.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/sharphound-covenant.png 145.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/proxychains.png 145.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/proxychains.png 145.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/media/image05.png 144.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/sec565.4.1/index.html 143.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image07.png 143.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/5/media/image03.png 141.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/vulntemplate.png 140.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/beacon1.png 140.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/beacon1.png 140.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/image07.png 139.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/wireshark-certreq.png 139.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image10.png 138.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/js/jquery.min.map 138.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/5/media/image00.png 137.5 kB
  • 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_3.webm 137.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/assets/stylesheets/main.644de097.min.css 135.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/pivot1.png 135.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/pivot1.png 135.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/empire/dcsyncsuccess.png 134.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/resources/img/virtual-machine-credentials/virtual-machine-information-panel-workstation.png 134.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image21.png 132.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image06.png 130.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/altname.png 130.9 kB
  • 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_18_2.webm 130.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image13.png 130.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image20.png 128.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image10.png 128.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/wireshark-ssh.png 127.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/spotlight.png 126.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image11.png 126.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/1/media/image02.png 126.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image03.png 126.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/media/image02.png 126.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image02.png 126.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/ftp.png 126.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/ftp.png 126.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/sacrifical.png 125.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/spotlight-plain.png 125.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/childhop/covenant/extrasids.png 125.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/images/vpn-connect.png 125.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image08.png 124.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image10.png 124.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/decrypted.png 124.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/images/test-connect.png 122.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image06.png 121.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image18.png 121.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image03.png 121.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image00.png 119.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image00.png 119.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image06.png 118.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/empire/vulntemplate.png 116.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image15.png 115.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image15.png 115.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image19.png 115.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/5/media/image01.png 115.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image00.png 115.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image00.png 115.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image00.png 115.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/1/media/image00.png 115.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image00.png 115.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/media/image00.png 115.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image00.png 115.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/image00.png 115.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image24.png 114.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image11.png 113.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/image01.png 113.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image13.png 113.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image09.png 112.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/sharphoundtask.png 112.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image01.png 112.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image01.png 112.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image01.png 112.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/1/media/image01.png 112.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image01.png 112.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/media/image01.png 112.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image01.png 112.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/image01.png 112.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/childhop/covenant/dcsync.png 111.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/spawnas.png 111.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/bundle.c44cc438.min.js 110.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image27.png 110.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/RSAT-gmsa.png 109.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/covenant/pth.png 109.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/image01.png 106.8 kB
  • 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_20.webm 106.5 kB
  • 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_21.webm 106.4 kB
  • 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_2.webm 106.4 kB
  • 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_21.webm 106.2 kB
  • 2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand.webm 106.0 kB
  • 2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_20.webm 105.8 kB
  • 2020/Sec450 Video/Section 1/1.9 DAY 1 SUMMARY/SEC450- SANS OnDemand_4.webm 105.7 kB
  • 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_5.webm 105.7 kB
  • 2020/Sec450 Video/Section 1/1.9 DAY 1 SUMMARY/SEC450- SANS OnDemand.webm 105.6 kB
  • 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_24.webm 105.5 kB
  • 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_4.webm 105.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image23.png 105.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/stager.png 105.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image09.png 104.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image05.png 104.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image09.png 104.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image01.png 103.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image01.png 103.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image12.png 103.6 kB
  • 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand.webm 103.4 kB
  • 2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_14_2.webm 103.3 kB
  • 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_26.webm 103.3 kB
  • 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_27.webm 103.2 kB
  • 2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_26.webm 103.2 kB
  • 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_30_2.webm 103.1 kB
  • 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_4.webm 103.1 kB
  • 2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_18.webm 103.0 kB
  • 2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_20_2.webm 102.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image04.png 102.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image04.png 102.5 kB
  • 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_13.webm 101.9 kB
  • 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_28.webm 101.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/translated-securitydescriptor.png 101.8 kB
  • 2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_13.webm 101.7 kB
  • 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_5.webm 101.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image11.png 101.6 kB
  • 2020/Sec450 Video/Section 3/3.9 DAY 3 SUMMARY/SEC450- SANS OnDemand.webm 101.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image09.png 100.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image09.png 100.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/bloodhound-local-admin-information.PNG 100.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/rsat-dns.png 100.1 kB
  • 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_30.webm 99.0 kB
  • 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_27.webm 98.8 kB
  • 2020/Sec450 Video/Section 2/2.9 DAY 2 SUMMARY/SEC450- SANS OnDemand_3_2.webm 98.8 kB
  • 2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand.webm 98.8 kB
  • 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand.webm 98.3 kB
  • 2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand.webm 98.2 kB
  • 2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_5_2.webm 97.9 kB
  • 2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_14.webm 97.9 kB
  • 2020/Sec450 Video/Section 2/2.9 DAY 2 SUMMARY/SEC450- SANS OnDemand_13.webm 97.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image05.png 97.7 kB
  • 2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_3_2.webm 97.1 kB
  • 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_25.webm 96.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image07.png 95.8 kB
  • 2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_16_2.webm 95.8 kB
  • 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_4.webm 95.6 kB
  • 2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_5.webm 95.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image17.png 95.1 kB
  • 2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_3_2.webm 93.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/pidmimi.png 93.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image25.png 93.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/5/media/image04.png 92.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/covenant/ptt.png 92.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image03.png 92.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/stealtoken.png 91.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image22.png 91.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/wireshark.png 91.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image13-1.png 90.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image11.png 90.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image05.png 89.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/js/jquery.min.js 89.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image17.png 89.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image11.png 88.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image11.png 88.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/js/jquery-3.4.1.min.js 88.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/cert.PNG 87.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/media/image10.png 87.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/psremoting.png 86.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image16.png 86.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/media/image09.png 85.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/1/media/image09.png 85.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/decode-base64.png 85.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/1/media/image05.png 84.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/proxychains-rdp.PNG 83.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/successfullrdp.png 83.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/snapin.png 83.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/media/image07.png 82.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image14.png 82.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/maketoken.png 82.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/mac-unzip.png 81.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/mac-mount.png 80.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image10.png 80.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/nc-encrypted.png 80.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/empire/certsuccess.png 80.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/1/media/image07.png 80.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/curl.png 80.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/sacrificalsession.png 79.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/1/media/image06.png 78.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image14.png 78.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image14.png 78.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/mac-mount-plain.png 78.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/sec565.5.1/index.html 78.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image25.png 77.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/childhop/covenant/krbtgt.png 77.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/media/image08.png 77.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/image04.png 76.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/media/image04.png 76.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/processlist.png 74.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image20.png 74.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/media/image06.png 74.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/childhop/empire/draconemkrbtgt.png 74.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor3/empire/dcsyncsuccess.png 74.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image06.png 74.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image10.png 73.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image10.png 73.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adexplorergui.png 72.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/certify.png 71.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/covenant/dcsync.png 71.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/childhop/covenant/trust.png 70.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/gpocomputeradmin.png 70.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/nc-base64.png 69.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image12.png 69.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image12.png 69.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image02.png 69.3 kB
  • 2020/Sec450 Video/Section 1/1.9 DAY 1 SUMMARY/SEC450- SANS OnDemand_3.webm 69.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/pth.png 68.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image13.png 68.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/js/jquery.fancybox.min.js 68.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/empire/download.png 67.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/covenant/fileshareaccess2.png 67.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/newou.png 67.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/download.png 67.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image28.png 67.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image07.png 66.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/proxychainsconf.png 66.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/proxychainsconf.png 66.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/ipv6.png 66.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/sec565.4.4/index.html 65.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/sharpmove.png 65.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/nc-plain.png 65.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image04.png 65.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/sharpshares.png 64.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/getnetlocalgroupmember.png 64.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image08.png 64.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/image06.png 63.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image13.png 63.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/getdomaingroup.png 62.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/sec565.4.2/index.html 62.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/wheresaved.png 62.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image11.png 62.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor3/empire/spawnas.png 62.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/ptt.png 62.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image12.png 61.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image12.png 61.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image08.png 60.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image12.png 60.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/regloggedon.png 60.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image13.png 60.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image13.png 60.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/newuser.png 60.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image16.png 59.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path3/workaround.png 59.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/getnetlocalgroupmember-remote.png 59.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/rubeus-monitor.png 59.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image07.png 59.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/sec565.2.4/index.html 59.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor4/empire/whiskersuccess.png 59.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/1/media/image03.png 59.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image04.png 59.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/media/image03.png 59.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image03.png 59.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/neo4jconnect.png 59.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/gpocomputeradmin.png 58.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/mac-mounted.png 58.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/users.png 58.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/advancedfeatures.png 58.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/1/media/image04.png 58.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/snmp-diagram.png 57.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/moddedpowerview.png 57.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/mac-mounte-plain.png 56.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/empire/monitor.png 56.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/luid.png 56.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/ff/494860fa56a838026843de0ba1a04005630e1a 56.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/sec565.3.3/index.html 56.3 kB
  • 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_23.webm 55.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image06.png 55.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image06.png 55.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/rubeus.png 55.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/sec565.5.2/index.html 54.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/sec565.1.4/index.html 54.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image05.png 54.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image05.png 54.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/invokerubeus.png 54.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/ipv6-diagram.png 54.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/invoke-mmc20.png 54.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/getnetlocalgroupmember.png 53.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/fgpwpol-rsat2.png 52.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/updatescript.png 52.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/sec565.1.3/index.html 52.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/bloodhound-recruiting-info.PNG 52.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/childhop/empire/extrasids.png 52.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/RSAT-pwpol2.png 52.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/containerprops.png 51.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image07.png 51.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image07.png 51.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image08.png 51.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image08.png 51.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/windows-extract.png 51.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/download.png 51.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/sec565.1.0/index.html 51.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/upload.png 50.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/sec565.2.1/index.html 50.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/mac-open-vm.png 50.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/getnetsession.png 50.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/pwresetneo.png 49.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/covenant/fileshareaccess.png 49.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/windows-extract-plain.png 49.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/properties.png 49.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adexp-trust.png 49.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image04.png 49.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image04.png 49.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/5/sec565.1.5/index.html 48.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/socks-traffic.PNG 48.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/sockstraffic.png 48.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/sacrificalprocess.png 48.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/empire/sacrificial.png 48.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/empire/token.png 48.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/sec565.1.2/index.html 47.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/changerights.png 47.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image07.png 47.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image05.png 47.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/1/sec565.3.1/index.html 47.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/childhop/empire/devsync.png 47.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/1/media/image00.png 47.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor3/empire/pwreset.png 46.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image06.png 46.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/mac-open-vm-plain.png 46.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path3/covenant/servicecreation.png 46.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/regloggedon.png 46.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/invoke-schtasklatmove.png 46.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/covenant/runas.png 46.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/empire/certreq.png 46.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/finder.png 46.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/neo4j-pw.PNG 45.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/getnetloggedonuser.png 45.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image03.png 45.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image03.png 45.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/stealtoken.png 45.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor1/empire/kerberoast.png 45.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/sec565.4.3/index.html 45.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/getnetsession.png 45.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/image02.png 45.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/assets/stylesheets/main.644de097.min.css.map 45.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor4/empire/whisker.png 45.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path3/empire/standin.png 44.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/dcomgrunt-callback.png 44.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/image04.png 44.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/openssl.PNG 43.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/sec565.3.4/index.html 43.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/covenant/rev2self.png 43.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/empire/dcsync-tbird.png 43.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/sec565.2.5/index.html 43.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/empire/findtemplates.png 43.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/sec565.3.2/index.html 43.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image02.png 42.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image02.png 42.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/servicecreation.png 42.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/net-administrator.png 42.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/1/sec565.1.1/index.html 41.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/sec565.2.2/index.html 41.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/empire/ptt-tbird.png 41.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/DCOMOptions.png 41.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/sec565.2.3/index.html 41.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/agents.PNG 40.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/scmscriptexec.png 40.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/sec565.5.3/index.html 39.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/sec565.5.4/index.html 39.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/asktgt.png 39.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/stager.png 39.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/powerviewcomputer.png 38.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/dcomgrunt.png 38.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/ssh-transfer.png 38.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/childhop/empire/sacrifical.png 38.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor4/empire/rubeus.png 37.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/escalation.png 37.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/windows-poweron.png 37.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/pivot2-diagram.png 36.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor1/covenant/spn.png 36.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/mac-move-file.png 36.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/mac-iso.png 36.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/workers/search.5e67fbfe.min.js 36.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/dcsync.png 36.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/empire/spool.png 36.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/rev2self.png 36.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/beacon1-diagram.png 35.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/beacon1-diagram.png 35.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/spoolsample.png 35.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/invokesocks.png 35.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/empire/maketoken.png 35.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/image15.png 34.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/empire/ptt.png 34.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/SharpAdidnsdump.png 33.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/mac-moved-it.png 33.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image03.png 33.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image03.png 33.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path3/covenant/success.png 33.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/socks-proxy-ftp-diagram.png 33.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/socks-proxy-ftp-diagram.png 33.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/covenant/monitor.png 33.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/spawnas2.png 33.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path3/covenant/standin.png 32.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/empire/asktgt-cert.png 32.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/psexec-execution.png 32.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/sharefinder.png 32.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor3/covenant/spawn.png 32.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/winrm.PNG 32.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/psexecgrunt.png 32.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/windows-mount.png 32.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path3/empire/s4u.png 32.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/computer-admodule.png 32.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/powerviewuserenum.png 31.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/covenant/powershellgrunt.png 31.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/img/SANS-Offensive-Operations-Logo.png 30.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/resources/syntax/index.html 30.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/image03.png 30.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/img/SANS-Offensive-Operations_Logo-Web-1.png 30.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor4/covenant/rubeus.png 30.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/image06.png 30.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path3/empire/invokepsexec.png 30.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/covenant/maketoken.png 30.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/resources/about-labs/index.html 29.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/location.png 29.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/pivot1-diagram.png 29.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/pivot1-diagram.png 29.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/childhop/empire/dcsync.png 29.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/empire/dcsync.png 29.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor3/empire/krbtgt.png 29.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/sharphound.png 29.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/48/9616ae2cc8cef6b317b082271b78dc1c0260f2 29.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor4/covenant/whisker.png 29.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/covenant/spooler.png 29.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/image00.png 29.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/covenant/sacrificialsession.png 28.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/covenant/rubeus.png 28.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/bastion-diagram-1.png 28.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/bastion-diagram-1.png 28.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor3/covenant/standin.png 28.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/fgpwpol-adfind.png 28.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/listfiles.png 28.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/runas.png 27.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/reverse-socks.PNG 27.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/ghostcontainer.png 27.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/psexec.png 27.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/index.html 27.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/netlocalgroupcmd.png 27.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adfind1.png 26.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/resources/license/index.html 26.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/empire/location.png 26.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/socksserver.png 26.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/mmc.PNG 26.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/bloodhound-recruiting.PNG 26.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/covenant/sacrificial.png 26.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/workbook-update.png 26.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/resources/virtual-machine-credentials/index.html 26.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/resources/whats-in-media/index.html 25.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/childhop/covenant/sacrificial.png 25.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/sharphound-covenant-download.png 25.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/windows-mounted.png 25.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/redirection.png 25.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/fgpwpol-custom.png 25.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/covenant/monitor.png 25.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/getnetloggedonuser.png 24.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/processlist.png 24.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/windows-openvm.png 23.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/windows-mounted-plain.png 23.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adfind-computers.png 23.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/childhop/empire/trust.png 22.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/pack/pack-a5835f7443762e31a13a10fffe23d05818565349.idx 22.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/tinyseg.js 22.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/covenant/roastticket.png 22.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/windows-iso.png 22.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/covenant/processimpersonation.png 22.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/scmcallback.png 22.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image08.png 21.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/remotingtask.png 21.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adusersandcomputers.png 21.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/404.html 21.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/LAPS-LAPSToolkit.png 21.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/LAPSToolKit.png 21.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adsi-passwordpolicy.png 21.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/systemgrunt.PNG 21.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/wmi.png 20.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/pack/pack-8738db4f374c1f90340e72cd7592dc8a00d61e7d.idx 20.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/domainpolicy-powerview.png 20.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/stagerscript.png 20.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/only-it-admodule.png 19.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/smbadexplorer.png 19.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adsi-users.png 18.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/84/75f97076f26f1850af73353b5d41113cacbec8 18.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/05/23dc52f56dd3ac1072e7b234d7831c903e448d 18.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/powershellremoting.png 18.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adfind2.png 18.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/image02.png 17.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/fgpwpol-admodule-highpriv.png 17.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/gmsa-powerview.png 17.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/2c/56dfcc4a6dd315447dae451f939e6c67b810b1 17.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor1/empire/setspn.png 17.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.ar.min.js 17.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/deny-all.png 17.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/socksserver.PNG 16.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/powershell.png 16.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/covenant/spool.png 16.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/advanced.png 16.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/httpserver.png 15.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/windows-extract-progress.png 15.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/powerviewtrust.png 15.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/wmic.png 15.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/pwpol-adfind.png 15.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.tr.min.js 15.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/gmsa-adfind.png 14.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/windows-extract-destination.png 14.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adfind-trust.png 14.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/psexec.png 14.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/domain-policy-admodule.png 13.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-agents.png 13.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/usersandcomputers.png 13.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/empire/ticket.png 13.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/image09.png 13.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/getnetlocalgroupmember-remote.png 13.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/e0/2aadd84c3e0afe4f00df88a585f06d37c70aa4 13.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/windows-extract-destination-plain.png 13.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/css/jquery.fancybox.min.css 12.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/maketoken.png 12.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/fileshareaccess.png 12.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/hraccess.png 12.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-listeners.png 12.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-settings.png 12.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/ssh.png 12.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/psexec-callback.png 11.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.es.min.js 11.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/covenant/gruntcheckin.png 11.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-credentials.png 11.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/certreq.png 11.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/changedir.png 11.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/certutil.png 11.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-stagers.png 11.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.it.min.js 11.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-modules.png 11.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-upload.png 11.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-users.png 11.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-download.png 11.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.ro.min.js 11.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/admodule-users.png 10.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adexp-ldapsearch.png 10.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.fr.min.js 10.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/assets/stylesheets/palette.e6a45f82.min.css 10.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/computeradsi.png 10.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/wmi-callback.png 10.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.ru.min.js 10.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-plugins.png 10.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/LAPS-ADFind.png 10.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.pt.min.js 10.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/covenant/taskkill.png 9.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/scmcallback.png 9.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/img/favicon.ico 9.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-actions.png 9.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.hu.min.js 9.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-reporting.png 9.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/only-description-users.png 9.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.fi.min.js 9.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adsidomainadmin.png 9.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/ou-noprot.png 9.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adsi-passwordpolicy2.png 8.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adsi-trust.png 8.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/fgpwpol-adsi.png 8.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/userui.png 8.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path3/covenant/systemgrunt.png 7.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/gmsa-adsi.png 7.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/admodule-dns.png 7.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/callback-psremote.png 7.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/admodule-trust.png 7.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/wmi-grunt.png 7.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/ca/84ac1073aae359ac1e5b8f9325870b17e21f23 7.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/replicationrights.png 6.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.du.min.js 6.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/gmsa-admodule.png 6.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.de.min.js 6.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/LAPS-ADModule.png 6.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/pack/pack-90b4589ad74a56edf25af390111108b7a85dc922.idx 6.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.nl.min.js 6.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adexplorer.png 5.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/LAPS-adsi.png 5.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/css/html.css 5.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/LAPS-Powerview.png 5.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/img/sans-logo.png 5.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/pack/pack-1f71ccc745b2d328a7b9e0611be72e6f5869c7b5.idx 5.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/color-icon.png 4.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/.git/hooks/pre-rebase.sample 4.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/search-icon.png 4.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.no.min.js 4.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.da.min.js 4.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/expand-icon.png 4.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.sv.min.js 4.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/pack/pack-03bdfb6e4174a4f0d659f690a6368cd0960936e3.idx 4.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/.git/logs/HEAD 4.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/sitemap.xml 3.7 kB
  • 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.stemmer.support.min.js 3.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/.git/hooks/update.sample 3.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.hi.min.js 3.4 kB
  • 2022/SEC565 Workbook/SEC565/workbook/.git/hooks/fsmonitor-watchman.sample 3.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/assets/stylesheets/palette.e6a45f82.min.css.map 3.2 kB
  • 2022/SEC565 Workbook/SEC565/workbook/resources/create_workbook-update_task.ps1 2.8 kB
  • 2022/SEC565 Workbook/SEC565/workbook/resources/workbook-update.sh 2.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.ja.min.js 2.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/3d/8421e59a505bdf9ba985880eaf6d36aaddbb48 2.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/ea/fa574bada54914d166fb3acde997aacb0a2a64 2.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.zh.min.js 2.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/img/magnify.png 2.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/assets/images/favicon.png 1.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/css/pdf.css 1.9 kB
  • 2022/SEC565 Workbook/SEC565/workbook/.git/hooks/pre-commit.sample 1.6 kB
  • 2022/SEC565 Workbook/SEC565/workbook/.git/hooks/prepare-commit-msg.sample 1.5 kB
  • 2022/SEC565 Workbook/SEC565/workbook/.git/hooks/pre-push.sample 1.3 kB
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/2f/8640a031993b3c67512637025321e2b16c3f48 1.1 kB
  • 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.th.min.js 1.0 kB
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/53/de862cb943ba1549b3f74dc36915b30d433560 978 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/hooks/commit-msg.sample 896 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/b8/207d92d91c81e2146a51d0ade6e658419d02df 847 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/a3/fc67491d0c0773f5109e11f63e65342ce57223 846 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.multi.min.js 817 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.vi.min.js 784 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/css/custom.css 708 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/logs/refs/remotes/origin/H02 655 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/resources/ewb-update.cron 647 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/logs/refs/heads/H02 630 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/js/workbook.js 588 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/hooks/pre-receive.sample 544 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/hooks/applypatch-msg.sample 478 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/a1/84b0ce3805d5ad6444ea18f238fb6584ab1f3c 432 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/hooks/pre-applypatch.sample 424 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/da/7d6e61c7d55d668daa9926a6711e1ec00025d4 408 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/e6/b940a862d66a6aa17f0307881cb2727fe826a6 408 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/4e/d2a7607a6682e5935607ca0ca91e0196c8316a 406 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/67/5fdf2b545027596a7b495ace99743303318d01 385 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/0d/edc770eea99e0b5b4669ee41d1a43a517e964f 384 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/9e/9e8ad53c5a50468f8aaf0f6b700669a096db00 383 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/88/c067a6e8d679991490eb03d3d81afc54ced430 383 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/ee/7fd17c297f539e8cc87c62218f16afd02fb1c9 383 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/61/1238327845b03cff69177e2f418eefe07e913d 382 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/b1/da70439c537b4231ac210462ae916498622105 382 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/26/37097d4f94c6abb01a2af700e9c86583f76303 362 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/logs/refs/heads/H01 361 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/resources/ewb-update.service 353 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/5d/7bc8cb8beef81ca6a47375280d9475aa9a0042 342 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/00/6fd2eb57dbc0e5142ecae18e399a2d04f335fb 291 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/fd/cf45be784b759cc32e53416508c5a942a5f024 291 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/cc/a6c95daae6170e62d10b4ea1afb754c99ce3d2 252 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/02/fed966c84d52b949af3800ebf03aefae36fd27 241 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/info/exclude 240 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/02/d571a5646a1be47b05eacead6838733bcdc45c 235 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/3a/7ba5dc6429f2e9fa3845c637555bf9bd6bad1c 235 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/5f/15446dfcd9929f5cbd8d98233728c8360196b7 235 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/09/b520f06003a8e93757a5a7c9d2526d72b35de7 235 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/17/aaf30eb9fe9b7b491f410725398bb08c0f5835 235 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/27/1557900d2ee8d1528b6d801428f836e8ee89e1 235 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/62/739e4fee5aa66b5be23a5cea1ebc33129d247b 235 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/f3/a5ba4489c938d3d367d4b22fbdddfb92c3a98f 235 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/1f/27b47ff2ba38a5d11b90efe2a9c81f8e296c1d 233 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/84/c38044b8eca9d77261866e1f2139cd7e2f1ba0 232 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/24/d09afff17f71bb288796c414d8f13cabca4d9f 217 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/bd/53ba48ced073cd40e7b9d84d77c3d0b992629a 217 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/sitemap.xml.gz 216 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/hooks/post-update.sample 189 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/aa/986bb76eac578ad8141d2cbbb87cab69f4a1e8 177 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/af/e8821fddcf33c87a74780fb0b25fbb3a292d98 177 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/logs/refs/remotes/origin/H01 168 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/f6/2c97053b67350781c91022e6c7502732af647d 159 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/98/1b7f78504388ecc59386d784aea66eaf0666ba 158 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/9d/af28ce076c9caefc698d358c1bf2e8d5c51cc7 157 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/14/aab081f4168b1b8ac88d54cab6fce1f917844e 140 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/21/dbd4683f80236d88c6b3fd93b74ce24b2b064c 139 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/README.md 138 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/38/4ad0535449cd92d4be44bb661904691ecd9f97 138 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/da/0ef3a7397c5983946944fcf189e0c47a4d4680 138 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/c1/5cb6a204f95b4fbffb8f83933d1555049ad286 137 Bytes
  • 2020/Sec450 Video/Section 1/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 1/1.9 DAY 1 SUMMARY/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 2/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 2/2.9 DAY 2 SUMMARY/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 3/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 3/3.9 DAY 3 SUMMARY/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 4/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 5/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/desktop.ini 136 Bytes
  • 2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/desktop.ini 136 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/76/8d34dbd14477adffedc8bb65d837683a51cccf 124 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/7e/9241be456ba52126ed989fabe0e652c5880159 120 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/2d/998800e82714f9bf49a526dad58579005ce6f8 119 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/68/47174915d557c8625d476e01729b2c1d569fe6 119 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/js/custom.js 102 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/2f/9135021c129ef110d51ddb8baf22ffcb37aaa1 81 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/3f/e5cbc0b2fb3a786225094600890dca934ec58e 81 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/7c/0638d285788a4719c5e51142e0e4de56b526f1 81 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/24/ad4f7777bd15fc57ef2baea5f0342ca66d1d4b 81 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/f4/4234e84a5e2b1e16ad42692240feecce88b2c9 81 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/4e/d14d631c5f245bba1a0089218b696edf85b181 62 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/8a/7f3976f26e9940fe7e84e5365b1a5b9d5553ca 62 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/c0/d978c3a5b6037cf3bfc471d7904da4811559bd 62 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/2c/7163b45ffd47628c2daa1726b1ae2877193e38 55 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/3e/772c297763593ef17d6d7712a4dec35a6b1b95 55 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/29/25ff65c0d7357e82cd854a97212950c96ea5d5 55 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/43/f529331ee38bf30f496dbfebd10ac244ff41d6 55 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/a9/ec9118fe728cab54b83fcf4738ce1448c9d479 55 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/objects/cc/e1f6306299917e72b85ecd9cb24f676613fdb3 54 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/refs/heads/H01 41 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/refs/heads/H02 41 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/refs/remotes/origin/H01 41 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/.git/refs/remotes/origin/H02 41 Bytes
  • 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.jp.min.js 36 Bytes
  • 2020/Sec450 PDF/PDF Password.txt 21 Bytes

随机展示

相关说明

本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!