搜索
SANS 450 - Blue team fundamentals
磁力链接/BT种子名称
SANS 450 - Blue team fundamentals
磁力链接/BT种子简介
种子哈希:
bc5ff400861123a7af5f101f7951a4b842e7fdcf
文件大小:
33.99G
已经下载:
483
次
下载速度:
极快
收录时间:
2024-01-06
最近下载:
2024-11-09
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:BC5FF400861123A7AF5F101F7951A4B842E7FDCF
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
91视频
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
抖阴破解版
暗网禁地
91短视频
TikTok成人版
PornHub
草榴社区
乱伦社区
最近搜索
hachi-ko
【逼儿盖子】
avop-062
ssis-852
povd 淡红色头维京人乱搞大鸡巴局外人
in flames
初中
青春美少女
sifang mj
creamy bikini
丽柜
风流名妓
丝厕拍
实力大佬,经典佳作,【男爵精品探花】出道16部合集
高中女生在学校
家有e妻
pedo-family
sienna day
clvr085
time 2021
元元
对话超刺激
259luxu-1204
+2763672+
breakers
props
355opcyn
twoo close for comfort s06
czech+bitch
cunshot compilation
文件列表
2020/Sec450 Virtual Machine/Sec450 Virtual Machine.iso
17.1 GB
2022/ISO/450.22.1.iso
15.4 GB
2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_21_2.webm
65.1 MB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_22.webm
64.8 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_29.webm
64.1 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_31.webm
62.2 MB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_21_2.webm
53.1 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_26.webm
43.3 MB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/pack/pack-8738db4f374c1f90340e72cd7592dc8a00d61e7d.pack
42.4 MB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand.webm
41.9 MB
2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_15_2.webm
39.5 MB
2020/Sec450 Video/Section 2/2.9 DAY 2 SUMMARY/SEC450- SANS OnDemand_4_2.webm
35.0 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_28.webm
34.6 MB
2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_9.webm
32.6 MB
2020/Sec450 PDF/SEC450 - Workbook.pdf
30.1 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_31_2.webm
28.3 MB
2020/Sec450 Video/Section 1/1.9 DAY 1 SUMMARY/SEC450- SANS OnDemand_5.webm
26.3 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_19_2.webm
25.2 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_20.webm
25.0 MB
2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_17.webm
21.7 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_21.webm
19.4 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_20.webm
19.1 MB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_11.webm
18.8 MB
2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_17_2.webm
18.5 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_2.webm
18.4 MB
2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand_3.webm
17.2 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_23.webm
16.4 MB
2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand_7.webm
15.7 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_11.webm
15.5 MB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_20_2.webm
15.1 MB
2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_5.webm
15.0 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_8.webm
14.8 MB
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_16_2.webm
14.7 MB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/pack/pack-a5835f7443762e31a13a10fffe23d05818565349.pack
14.6 MB
2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_4_2.webm
14.6 MB
2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_7_2.webm
14.1 MB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_13.webm
13.8 MB
2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_15_2.webm
13.7 MB
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_5_2.webm
13.5 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_14.webm
13.4 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_23.webm
13.3 MB
2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_12_2.webm
13.3 MB
2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_13.webm
13.2 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_7.webm
13.1 MB
2022/PDF/SEC450 (2022)/SEC450 - Book 2 (2022).pdf
13.0 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_25.webm
12.8 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_19.webm
12.7 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_19.webm
12.2 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_7.webm
12.2 MB
2020/Sec450 PDF/SEC450 - Book 2.pdf
12.2 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_18.webm
12.1 MB
2022/PDF/SEC450 (2022)/SEC450 - Book 3 (2022).pdf
11.7 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_2.webm
11.6 MB
2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_10.webm
11.5 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_20.webm
11.3 MB
2020/Sec450 Video/Section 3/3.9 DAY 3 SUMMARY/SEC450- SANS OnDemand_3.webm
11.3 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_12.webm
11.3 MB
2022/PDF/SEC450 (2022)/SEC450 - Book 5 (2022).pdf
11.3 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_10.webm
11.2 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_12_2.webm
11.0 MB
2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_13_2.webm
11.0 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_10.webm
11.0 MB
2020/Sec450 PDF/SEC450 - Book 5.pdf
10.9 MB
2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_6.webm
10.9 MB
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_17_2.webm
10.8 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_22_2.webm
10.8 MB
2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_13_2.webm
10.6 MB
2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_5_2.webm
10.5 MB
2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_11.webm
10.5 MB
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_13.webm
10.5 MB
2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_15.webm
10.5 MB
2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_11_2.webm
10.4 MB
2022/PDF/SEC450 (2022)/SEC450 - Book 1 (2022).pdf
10.3 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_20.webm
10.3 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_8.webm
10.2 MB
2020/Sec450 PDF/SEC450 - Book 3.pdf
10.2 MB
2020/Sec450 PDF/SEC450 - Book 1.pdf
10.2 MB
2022/PDF/SEC450 (2022)/SEC450 - Book 4 (2022).pdf
10.2 MB
2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_7_2.webm
10.1 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_29.webm
10.1 MB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_8_2.webm
10.0 MB
2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_2.webm
10.0 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_13.webm
10.0 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_17.webm
9.9 MB
2020/Sec450 PDF/SEC450 - Book 4.pdf
9.8 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_13.webm
9.8 MB
2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_12.webm
9.7 MB
2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_15_2.webm
9.6 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_20.webm
9.5 MB
2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_6_2.webm
9.4 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_10.webm
9.3 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_26.webm
9.3 MB
2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_11_2.webm
9.2 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_18.webm
9.2 MB
2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_9_2.webm
9.2 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_21.webm
9.1 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_6.webm
9.1 MB
2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_8_2.webm
9.0 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_14.webm
9.0 MB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_21.webm
8.8 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_31.webm
8.8 MB
2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_7_2.webm
8.8 MB
2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_9.webm
8.8 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_14_3.webm
8.7 MB
2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_10.webm
8.6 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_17.webm
8.4 MB
2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_9_2.webm
8.4 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_19_2.webm
8.4 MB
2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_4.webm
8.3 MB
2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_8.webm
8.3 MB
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_21_2.webm
8.3 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_19.webm
8.3 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_24.webm
8.2 MB
2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_6.webm
8.2 MB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_18.webm
8.2 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_21_2.webm
8.2 MB
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_15_2.webm
8.2 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_21.webm
8.1 MB
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_17_2.webm
8.0 MB
2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_18_2.webm
8.0 MB
2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_14_2.webm
7.9 MB
2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_16_2.webm
7.7 MB
2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_14_2.webm
7.7 MB
2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_13_2.webm
7.6 MB
2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_15.webm
7.6 MB
2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_2_2.webm
7.6 MB
2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_3_2.webm
7.6 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_26.webm
7.6 MB
2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_4.webm
7.5 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_22.webm
7.5 MB
2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_17.webm
7.5 MB
2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_8_2.webm
7.4 MB
2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_14_2.webm
7.4 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_12.webm
7.4 MB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_18_2.webm
7.4 MB
2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_6_2.webm
7.4 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_25.webm
7.4 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_20_2.webm
7.2 MB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_22.webm
7.2 MB
2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand_10.webm
7.2 MB
2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_6_2.webm
7.1 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_16_2.webm
7.1 MB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_6.webm
7.1 MB
2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_7_2.webm
7.0 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_28.webm
7.0 MB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_18.webm
6.9 MB
2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_20.webm
6.9 MB
2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_5_2.webm
6.9 MB
2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_8_2.webm
6.8 MB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_15.webm
6.8 MB
2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_11_2.webm
6.8 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_11.webm
6.7 MB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_22.webm
6.7 MB
2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_12.webm
6.7 MB
2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_11.webm
6.7 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_19.webm
6.7 MB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_13_3.webm
6.7 MB
2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_8_2.webm
6.7 MB
2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_6.webm
6.7 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_5.webm
6.6 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_4.webm
6.6 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_22.webm
6.6 MB
2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_14.webm
6.5 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_10.webm
6.5 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_11.webm
6.4 MB
2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_6.webm
6.4 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_27.webm
6.4 MB
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_12_2.webm
6.4 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_10_2.webm
6.4 MB
2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_8.webm
6.3 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_12.webm
6.3 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_9_2.webm
6.3 MB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_18.webm
6.3 MB
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_20_2.webm
6.2 MB
2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_8_2.webm
6.2 MB
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_11_2.webm
6.1 MB
2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_6_2.webm
6.1 MB
2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_12.webm
6.1 MB
2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_5.webm
6.1 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_24.webm
6.0 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_14.webm
6.0 MB
2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_4.webm
6.0 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_16.webm
6.0 MB
2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand.webm
6.0 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_5.webm
5.9 MB
2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_2.webm
5.9 MB
2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_15_2.webm
5.9 MB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_14.webm
5.8 MB
2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_10_2.webm
5.8 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_14_2.webm
5.8 MB
2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_17.webm
5.7 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_8.webm
5.7 MB
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_12_2.webm
5.7 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_14.webm
5.7 MB
2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_2_2.webm
5.7 MB
2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_11.webm
5.6 MB
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_7_2.webm
5.6 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_13_2.webm
5.6 MB
2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_11.webm
5.6 MB
2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_15.webm
5.5 MB
2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_10.webm
5.5 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_11.webm
5.5 MB
2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_14_2.webm
5.5 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_23.webm
5.5 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_18.webm
5.5 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_8.webm
5.5 MB
2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_3.webm
5.4 MB
2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_20.webm
5.4 MB
2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_17_2.webm
5.4 MB
2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_3.webm
5.4 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_12.webm
5.4 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_13_2.webm
5.3 MB
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_9_2.webm
5.3 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_23_2.webm
5.3 MB
2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_11.webm
5.2 MB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_10_2.webm
5.2 MB
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_19_2.webm
5.2 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_28.webm
5.2 MB
2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_17.webm
5.2 MB
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_10_2.webm
5.2 MB
2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_10.webm
5.2 MB
2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_21.webm
5.1 MB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_20.webm
5.1 MB
2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_10_2.webm
5.0 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_4_2.webm
5.0 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_18_2.webm
5.0 MB
2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_12.webm
5.0 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_19.webm
5.0 MB
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_14_2.webm
5.0 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_18.webm
5.0 MB
2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_9.webm
4.9 MB
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_11_2.webm
4.9 MB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_4.webm
4.9 MB
2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_7.webm
4.9 MB
2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_3_2.webm
4.9 MB
2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_7.webm
4.9 MB
2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_19.webm
4.9 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_20.webm
4.9 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_17_2.webm
4.8 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_24.webm
4.8 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_6.webm
4.8 MB
2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_15.webm
4.8 MB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_14_2.webm
4.8 MB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_12.webm
4.7 MB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_2.webm
4.7 MB
2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_3.webm
4.7 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_8.webm
4.7 MB
2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_2.webm
4.7 MB
2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_4_2.webm
4.6 MB
2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_10_2.webm
4.6 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_24_2.webm
4.6 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_3.webm
4.6 MB
2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_11_2.webm
4.6 MB
2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_8.webm
4.6 MB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_24.webm
4.6 MB
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_20_2.webm
4.6 MB
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_17_2.webm
4.6 MB
2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_9.webm
4.5 MB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_17_2.webm
4.5 MB
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_5_2.webm
4.5 MB
2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_18_2.webm
4.5 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_13.webm
4.5 MB
2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_7.webm
4.5 MB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_7.webm
4.4 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_22.webm
4.4 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_28.webm
4.4 MB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_7_2.webm
4.4 MB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_17.webm
4.4 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_11.webm
4.4 MB
2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand_5.webm
4.4 MB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_12_2.webm
4.4 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_3_2.webm
4.4 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_12_2.webm
4.4 MB
2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_5.webm
4.3 MB
2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_11_2.webm
4.3 MB
2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_19.webm
4.3 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_17_2.webm
4.3 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_32.webm
4.3 MB
2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_15.webm
4.3 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_17.webm
4.2 MB
2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_16_2.webm
4.2 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_15.webm
4.2 MB
2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_4_2.webm
4.2 MB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_23.webm
4.2 MB
2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_13.webm
4.2 MB
2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_13_3.webm
4.2 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_21.webm
4.2 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_22.webm
4.2 MB
2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_4_2.webm
4.2 MB
2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_9.webm
4.1 MB
2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_14.webm
4.1 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_21.webm
4.1 MB
2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_13.webm
4.1 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_11_2.webm
4.1 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_8.webm
4.1 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_10.webm
4.1 MB
2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_4_3.webm
4.1 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_15.webm
4.1 MB
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_20_2.webm
4.0 MB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_22_2.webm
4.0 MB
2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_12_2.webm
4.0 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_6.webm
4.0 MB
2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_16.webm
4.0 MB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_4_2.webm
4.0 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_2_2.webm
4.0 MB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_15.webm
4.0 MB
2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_3_2.webm
4.0 MB
2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_6.webm
4.0 MB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_4.webm
4.0 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_4_2.webm
4.0 MB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_21.webm
3.9 MB
2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_4.webm
3.9 MB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_23.webm
3.9 MB
2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand_4.webm
3.9 MB
2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_14_2.webm
3.9 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_8_2.webm
3.9 MB
2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_16_2.webm
3.9 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_21_2.webm
3.9 MB
2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_10.webm
3.9 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_12.webm
3.9 MB
2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_9_2.webm
3.8 MB
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_8_2.webm
3.8 MB
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_21_2.webm
3.8 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_26.webm
3.8 MB
2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand_9.webm
3.8 MB
2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_9_2.webm
3.8 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_25.webm
3.8 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_17.webm
3.8 MB
2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_18.webm
3.7 MB
2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_14.webm
3.7 MB
2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_4.webm
3.7 MB
2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_9.webm
3.7 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_24.webm
3.7 MB
2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_10_2.webm
3.7 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_6.webm
3.7 MB
2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_8_2.webm
3.7 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_9.webm
3.7 MB
2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_7.webm
3.7 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_27.webm
3.7 MB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_10.webm
3.7 MB
2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_7_2.webm
3.7 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_6.webm
3.6 MB
2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_3_2.webm
3.6 MB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_16.webm
3.6 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_7.webm
3.6 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_21.webm
3.6 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_4_2.webm
3.6 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_11.webm
3.6 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_13.webm
3.6 MB
2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_18.webm
3.5 MB
2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_19_2.webm
3.5 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_4.webm
3.5 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_15.webm
3.5 MB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_23.webm
3.5 MB
2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_3.webm
3.5 MB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_9_2.webm
3.5 MB
2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_10_2.webm
3.5 MB
2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_4.webm
3.5 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_8_2.webm
3.5 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_7_2.webm
3.5 MB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_14.webm
3.5 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_14_2.webm
3.5 MB
2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_7_2.webm
3.5 MB
2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_14_2.webm
3.4 MB
2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_10_2.webm
3.4 MB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_11_2.webm
3.4 MB
2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_12_2.webm
3.4 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_25_2.webm
3.4 MB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_15.webm
3.4 MB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_24_2.webm
3.4 MB
2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_9_2.webm
3.4 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_31.webm
3.4 MB
2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_18_2.webm
3.4 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_8.webm
3.4 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_18.webm
3.4 MB
2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_16_2.webm
3.4 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_28_2.webm
3.3 MB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_18.webm
3.3 MB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_8.webm
3.3 MB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_10_2.webm
3.3 MB
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_4_2.webm
3.3 MB
2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_8_2.webm
3.3 MB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_9_2.webm
3.3 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_5_2.webm
3.2 MB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_5.webm
3.2 MB
2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_17_2.webm
3.2 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_26.webm
3.2 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_23.webm
3.2 MB
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_19_2.webm
3.2 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_30.webm
3.2 MB
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_18_2.webm
3.2 MB
2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_10.webm
3.2 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_24.webm
3.2 MB
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_16_2.webm
3.2 MB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_7_2.webm
3.2 MB
2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_5.webm
3.2 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_19.webm
3.2 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_13.webm
3.1 MB
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_7_2.webm
3.1 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_16.webm
3.1 MB
2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand_11.webm
3.1 MB
2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_9_2.webm
3.1 MB
2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_15_2.webm
3.1 MB
2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_5_2.webm
3.1 MB
2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_13_2.webm
3.1 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_15.webm
3.1 MB
2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_12_2.webm
3.1 MB
2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_11_2.webm
3.1 MB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_17.webm
3.1 MB
2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_5_2.webm
3.1 MB
2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_4_2.webm
3.1 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_4.webm
3.1 MB
2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_18_2.webm
3.1 MB
2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_6_2.webm
3.1 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_6_2.webm
3.1 MB
2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_2_2.webm
3.1 MB
2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_17.webm
3.1 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_20.webm
3.1 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_11_2.webm
3.0 MB
2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_15_2.webm
3.0 MB
2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_10.webm
3.0 MB
2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_8.webm
3.0 MB
2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_5_2.webm
3.0 MB
2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_12_2.webm
3.0 MB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_14.webm
3.0 MB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_6_2.webm
3.0 MB
2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_9_2.webm
3.0 MB
2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_7.webm
3.0 MB
2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_16.webm
3.0 MB
2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_10_2.webm
3.0 MB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_14.webm
3.0 MB
2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_5_2.webm
3.0 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_19.webm
3.0 MB
2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_4_2.webm
3.0 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_14.webm
3.0 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_20.webm
3.0 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_25.webm
2.9 MB
2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_11_2.webm
2.9 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_25.webm
2.9 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_22.webm
2.9 MB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_5_2.webm
2.9 MB
2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_20_2.webm
2.9 MB
2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_16.webm
2.9 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_15_2.webm
2.9 MB
2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_6.webm
2.9 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_5_2.webm
2.9 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_18_2.webm
2.9 MB
2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_14.webm
2.9 MB
2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_20_2.webm
2.9 MB
2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_14.webm
2.9 MB
2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_10_2.webm
2.9 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_9.webm
2.9 MB
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_14_2.webm
2.9 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_29.webm
2.8 MB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/pack/pack-03bdfb6e4174a4f0d659f690a6368cd0960936e3.pack
2.8 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_9.webm
2.8 MB
2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_4_2.webm
2.8 MB
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_3_2.webm
2.8 MB
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_3.webm
2.8 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_3.webm
2.8 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_7.webm
2.8 MB
2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_13_2.webm
2.8 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_10.webm
2.8 MB
2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_15_2.webm
2.8 MB
2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_5.webm
2.8 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_4.webm
2.8 MB
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_6_2.webm
2.8 MB
2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_18.webm
2.8 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_23.webm
2.8 MB
2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_19.webm
2.8 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_3_2.webm
2.8 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_14.webm
2.7 MB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_3_2.webm
2.7 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_4.webm
2.7 MB
2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_6_2.webm
2.7 MB
2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_3_2.webm
2.7 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_23.webm
2.7 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_5.webm
2.7 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_12.webm
2.7 MB
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_3_2.webm
2.7 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_27.webm
2.7 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_27.webm
2.7 MB
2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_6.webm
2.7 MB
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_22_2.webm
2.7 MB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_10.webm
2.7 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_17.webm
2.7 MB
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_10_2.webm
2.7 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_15_2.webm
2.7 MB
2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_11_2.webm
2.7 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_30.webm
2.7 MB
2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_7.webm
2.6 MB
2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_2_2.webm
2.6 MB
2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_16_2.webm
2.6 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_7_2.webm
2.6 MB
2020/Sec450 Video/Section 1/1.9 DAY 1 SUMMARY/SEC450- SANS OnDemand_2.webm
2.6 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_10.webm
2.6 MB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_5_2.webm
2.6 MB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_2_2.webm
2.6 MB
2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_13.webm
2.6 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_16.webm
2.6 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_17.webm
2.6 MB
2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_7_2.webm
2.5 MB
2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_2_2.webm
2.5 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_9.webm
2.5 MB
2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_2.webm
2.5 MB
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_13_2.webm
2.5 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_23.webm
2.5 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_15.webm
2.5 MB
2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_7.webm
2.5 MB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_8_2.webm
2.5 MB
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_15_2.webm
2.5 MB
2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_12_2.webm
2.4 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_16.webm
2.4 MB
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_4_3.webm
2.4 MB
2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_19.webm
2.4 MB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_3_2.webm
2.4 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_10_2.webm
2.4 MB
2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_13.webm
2.4 MB
2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_12.webm
2.4 MB
2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_7_2.webm
2.4 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_15.webm
2.4 MB
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_5_2.webm
2.4 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_24.webm
2.4 MB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_16_2.webm
2.4 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_26_2.webm
2.4 MB
2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_9_2.webm
2.4 MB
2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_5.webm
2.4 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_11.webm
2.4 MB
2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_2_2.webm
2.4 MB
2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_4_2.webm
2.3 MB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_12.webm
2.3 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_29.webm
2.3 MB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_7.webm
2.3 MB
2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_12.webm
2.3 MB
2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_10_2.webm
2.3 MB
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_18_2.webm
2.3 MB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_3.webm
2.3 MB
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_18_2.webm
2.3 MB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_19.webm
2.3 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_19_2.webm
2.3 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_3.webm
2.2 MB
2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_6_2.webm
2.2 MB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_11.webm
2.2 MB
2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_3.webm
2.2 MB
2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_13_2.webm
2.2 MB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_17.webm
2.2 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_16.webm
2.2 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_16.webm
2.2 MB
2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_13.webm
2.2 MB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_10.webm
2.2 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_3.webm
2.2 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_5.webm
2.2 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_3_2.webm
2.1 MB
2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_8_2.webm
2.1 MB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_16.webm
2.1 MB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_19.webm
2.1 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_22.webm
2.1 MB
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_2_2.webm
2.1 MB
2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_13_2.webm
2.1 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_16_2.webm
2.1 MB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_11_2.webm
2.1 MB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_22.webm
2.1 MB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_8.webm
2.1 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_6.webm
2.1 MB
2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_21_2.webm
2.1 MB
2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_13_2.webm
2.1 MB
2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_10.webm
2.1 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_9.webm
2.1 MB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_9.webm
2.0 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_6.webm
2.0 MB
2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_12_2.webm
2.0 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_17_2.webm
2.0 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_5.webm
2.0 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_26_3.webm
2.0 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_7.webm
2.0 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_16.webm
2.0 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_28.webm
2.0 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_14.webm
2.0 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_21.webm
2.0 MB
2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_2.webm
2.0 MB
2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_3_2.webm
2.0 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_20_2.webm
2.0 MB
2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_14_2.webm
2.0 MB
2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand_12.webm
2.0 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_15.webm
2.0 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_3_2.webm
2.0 MB
2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_6_2.webm
2.0 MB
2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_5_2.webm
1.9 MB
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_10_2.webm
1.9 MB
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_16_2.webm
1.9 MB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_15.webm
1.9 MB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_17.webm
1.9 MB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_20.webm
1.9 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_2.webm
1.9 MB
2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_3_2.webm
1.9 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_24_2.webm
1.9 MB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_6.webm
1.9 MB
2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_5_2.webm
1.9 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_9.webm
1.9 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_8.webm
1.9 MB
2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_7_2.webm
1.9 MB
2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_14_2.webm
1.9 MB
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_11_2.webm
1.8 MB
2020/Sec450 Video/Section 3/3.9 DAY 3 SUMMARY/SEC450- SANS OnDemand_2.webm
1.8 MB
2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_11_2.webm
1.8 MB
2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_7.webm
1.8 MB
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_2.webm
1.8 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_13_2.webm
1.8 MB
2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_13.webm
1.8 MB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_23_2.webm
1.8 MB
2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_5.webm
1.8 MB
2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_20_2.webm
1.8 MB
2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_12.webm
1.8 MB
2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_2_2.webm
1.8 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_22_2.webm
1.8 MB
2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_9.webm
1.8 MB
2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand_2.webm
1.8 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_26.webm
1.8 MB
2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_4_2.webm
1.8 MB
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_12_2.webm
1.8 MB
2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_4_3.webm
1.8 MB
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_14_2.webm
1.8 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_22.webm
1.7 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_17_2.webm
1.7 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_11.webm
1.7 MB
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_9_2.webm
1.7 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_13_2.webm
1.7 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_4_2.webm
1.7 MB
2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand_8.webm
1.7 MB
2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_15.webm
1.7 MB
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_8_2.webm
1.7 MB
2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_6_2.webm
1.7 MB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand.webm
1.7 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_18.webm
1.7 MB
2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_12_2.webm
1.7 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_2.webm
1.7 MB
2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_11.webm
1.7 MB
2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_12_2.webm
1.7 MB
2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_13.webm
1.7 MB
2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_8.webm
1.7 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_2_2.webm
1.7 MB
2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_3_2.webm
1.6 MB
2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_8.webm
1.6 MB
2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_9.webm
1.6 MB
2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_6.webm
1.6 MB
2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_10_2.webm
1.6 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_25.webm
1.6 MB
2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_30.webm
1.6 MB
2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_2.webm
1.6 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_2_2.webm
1.6 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_7.webm
1.6 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_24.webm
1.6 MB
2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_12.webm
1.6 MB
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_6_2.webm
1.6 MB
2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_2_2.webm
1.6 MB
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_22_2.webm
1.5 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_6.webm
1.5 MB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_3.webm
1.5 MB
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_22_2.webm
1.5 MB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_16.webm
1.5 MB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_2_2.webm
1.5 MB
2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_17.webm
1.5 MB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_12_2.webm
1.5 MB
2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_14.webm
1.5 MB
2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_11.webm
1.5 MB
2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_2_2.webm
1.5 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_18.webm
1.5 MB
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_21_2.webm
1.5 MB
2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_6_2.webm
1.5 MB
2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_19_2.webm
1.5 MB
2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_12.webm
1.5 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_9_2 (1).webm
1.5 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_9_2.webm
1.5 MB
2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_15_2.webm
1.5 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_27.webm
1.5 MB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_13.webm
1.5 MB
2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_3_2.webm
1.4 MB
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_6_2.webm
1.4 MB
2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_8_2.webm
1.4 MB
2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_8_2.webm
1.4 MB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_11.webm
1.4 MB
2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_15.webm
1.4 MB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/pack/pack-90b4589ad74a56edf25af390111108b7a85dc922.pack
1.4 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_12.webm
1.4 MB
2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_11_2.webm
1.4 MB
2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_2.webm
1.4 MB
2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_18.webm
1.4 MB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_4_2.webm
1.4 MB
2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_19_2.webm
1.4 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_12.webm
1.4 MB
2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_4_2.webm
1.4 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_29_2.webm
1.4 MB
2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_5_2.webm
1.4 MB
2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_8_2.webm
1.4 MB
2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_17.webm
1.3 MB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_2.webm
1.3 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_15_2.webm
1.3 MB
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_7_2.webm
1.3 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_22.webm
1.3 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_9.webm
1.3 MB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_6_2.webm
1.3 MB
2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_11_2.webm
1.3 MB
2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_2_2.webm
1.3 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand.webm
1.3 MB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/pack/pack-1f71ccc745b2d328a7b9e0611be72e6f5869c7b5.pack
1.3 MB
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_2_2.webm
1.3 MB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_9.webm
1.3 MB
2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_2_2.webm
1.3 MB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_15_2.webm
1.3 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_2.webm
1.3 MB
2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_19_2.webm
1.3 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_16_2.webm
1.3 MB
2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_3.webm
1.3 MB
2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_19.webm
1.3 MB
2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_13_2.webm
1.3 MB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_6.webm
1.3 MB
2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_17_2.webm
1.2 MB
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_4_2.webm
1.2 MB
2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_12_2.webm
1.2 MB
2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_16.webm
1.2 MB
2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_2.webm
1.2 MB
2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_2_2.webm
1.2 MB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_12.webm
1.2 MB
2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_9_2.webm
1.2 MB
2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_5_2.webm
1.2 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_26.webm
1.2 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_25_2.webm
1.2 MB
2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_8.webm
1.2 MB
2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_11.webm
1.2 MB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_19.webm
1.2 MB
2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_16.webm
1.2 MB
2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_6_2.webm
1.2 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_23_2.webm
1.1 MB
2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_5_2.webm
1.1 MB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_19_2.webm
1.1 MB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_7.webm
1.1 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_10.webm
1.1 MB
2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_4_2.webm
1.1 MB
2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_21.webm
1.1 MB
2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_17_2.webm
1.1 MB
2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_3_2.webm
1.1 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_24.webm
1.1 MB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_5.webm
1.1 MB
2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand.webm
1.1 MB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_13_2.webm
1.0 MB
2020/Sec450 Video/Section 2/2.9 DAY 2 SUMMARY/SEC450- SANS OnDemand_2_2.webm
1.0 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_2_2.webm
1.0 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_32.webm
1.0 MB
2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_30.webm
1.0 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_23.webm
1.0 MB
2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_12_2.webm
998.0 kB
2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand_6.webm
997.4 kB
2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_20.webm
995.5 kB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_9.webm
992.0 kB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_6_2.webm
988.3 kB
2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_10_2.webm
974.1 kB
2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_18.webm
973.3 kB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_5.webm
962.2 kB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_5.webm
960.4 kB
2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_4.webm
957.5 kB
2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_3.webm
947.8 kB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_9.webm
946.2 kB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_3.webm
919.0 kB
2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_16.webm
917.0 kB
2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_7_2.webm
904.1 kB
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_15_2.webm
900.0 kB
2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_13_2.webm
891.3 kB
2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_14.webm
889.1 kB
2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_6_2.webm
887.5 kB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_20.webm
884.0 kB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand.webm
882.8 kB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_28.webm
864.0 kB
2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_7.webm
859.3 kB
2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_16.webm
857.4 kB
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_13_2.webm
852.1 kB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_27_2.webm
848.0 kB
2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_8.webm
845.1 kB
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_9_2.webm
841.8 kB
2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_19.webm
839.0 kB
2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_9_2.webm
827.8 kB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_7.webm
823.2 kB
2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_13_2.webm
819.5 kB
2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_14_2.webm
782.7 kB
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_19_2.webm
774.4 kB
2022/SEC565 Workbook/SEC565/workbook/search/search_index.json
757.1 kB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_19.webm
754.2 kB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_8.webm
750.8 kB
2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_29.webm
739.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/vt-capable.png
738.6 kB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_7.webm
721.3 kB
2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_11.webm
690.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image02.png
687.4 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/wordcut.js
677.5 kB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_13.webm
674.1 kB
2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_7_2.webm
673.5 kB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_2.webm
655.0 kB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_3.webm
631.7 kB
2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_9_2.webm
605.0 kB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand.webm
578.7 kB
2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_14.webm
557.0 kB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_24.webm
555.3 kB
2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_9.webm
551.9 kB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_16.webm
535.8 kB
2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand.webm
529.9 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/bundle.c44cc438.min.js.map
527.2 kB
2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_3.webm
519.8 kB
2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_4.webm
460.2 kB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_32.webm
458.0 kB
2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand.webm
449.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image10.png
434.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image05.png
417.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/rubeusinput.png
412.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path3/covenant/s4u.png
408.7 kB
2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_6.webm
387.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/copied-it.png
373.6 kB
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_8_2.webm
371.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor4/covenant/whiskersuccess.png
366.0 kB
2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_8.webm
340.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/formatting.png
331.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image09.png
322.8 kB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_21.webm
321.8 kB
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_29.webm
316.0 kB
2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_10.webm
314.1 kB
2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand.webm
312.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image06.png
305.7 kB
2022/SEC565 Workbook/SEC565/workbook/resources/img/virtual-machine-credentials/virtual-machine-information-panel-fusion.png
305.2 kB
2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_16.webm
301.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/empire/certpem.png
301.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image10.png
298.5 kB
2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_15.webm
297.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/covenant/ticket.png
296.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/gui-replication.png
294.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/fgpwpol-adexplorer.png
288.7 kB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_13.webm
285.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/covenant/rubeus.png
283.4 kB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand.webm
277.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/LAPS-ADExplorer.png
276.4 kB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand.webm
274.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/webpage.png
269.3 kB
2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_4_2.webm
266.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image09.png
266.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/image03.png
265.8 kB
2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_17.webm
262.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor4/covenant/ntlm.png
262.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image04.png
261.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adexplorer-gmsa.png
259.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image15.png
255.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adexplorer-pwpol.png
255.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/asktgt2.png
253.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/image05.png
242.8 kB
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand.webm
237.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image08.png
234.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/snmp.png
233.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adexplorer-computeraccounts.png
231.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image07.png
231.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image12.png
229.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image08.png
228.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/image08.png
227.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor1/empire/kerberoast-ticket.png
227.0 kB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_4.webm
226.0 kB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_25.webm
224.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adexplorerusers.png
223.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image23.png
221.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image22.png
217.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image21.png
217.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/ptt.png
216.4 kB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_25.webm
215.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image00.png
211.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image05.png
209.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/5/media/image02.png
208.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/GPO-RSAT.png
206.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/covenant/ticket.png
205.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/covenant/cracked.png
202.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image18.png
201.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/ticket.png
201.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/fgpwpol-rsat1.png
201.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image04.png
198.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/covenant/ptt.png
197.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/neo4j.png
194.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image14.png
194.1 kB
2022/SEC565 Workbook/SEC565/workbook/resources/img/webshell.png
193.0 kB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_29.webm
192.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image19.png
191.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor4/empire/ntlm.png
189.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/rdp-success.PNG
187.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/pivot1-ifconfig.png
186.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/pivot1-ifconfig.png
186.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/jumphost.png
185.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/sharpview-groupenum.png
184.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/workbook.png
179.8 kB
2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand.webm
179.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/image05.png
175.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image24.png
175.8 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/workers/search.5e67fbfe.min.js.map
173.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/output.png
172.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor1/covenant/roast.png
172.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/GPO-RSAT2.png
171.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/wireshark-encrypted.png
170.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image26.png
170.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image14.png
170.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/ssh-bastion.png
169.1 kB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/93/3b9823bd803b0e52d60d26505b12ddb500a6fe
167.1 kB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/26/a2ff5efa99622c7bf7d8b6853885fc3af41cd3
166.9 kB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/3c/4617241c5a0ddbb53b50fc62b7a346549cd939
166.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image02.png
163.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/krbtgt.png
160.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/ssh-bastion.png
159.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/ftp-get-key.png
157.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image11.png
157.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/fit-window.png
156.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/certgen.png
156.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/covenant/tgt.png
156.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image01.png
155.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/covenant/hraccess.png
155.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image29.png
154.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image09.png
153.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/covenant/dcsync.png
153.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor3/covenant/dcsync.png
152.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/computermmc.png
152.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/wireshark-base64.png
151.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/displays.png
149.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image02.png
149.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image02.png
149.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/RSAT-pwpol.png
148.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/1/media/image08.png
147.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/krbtgt.png
147.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image15.png
147.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/sharphound-covenant.png
145.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/proxychains.png
145.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/proxychains.png
145.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/media/image05.png
144.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/sec565.4.1/index.html
143.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image07.png
143.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/5/media/image03.png
141.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/vulntemplate.png
140.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/beacon1.png
140.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/beacon1.png
140.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/image07.png
139.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/wireshark-certreq.png
139.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image10.png
138.8 kB
2022/SEC565 Workbook/SEC565/workbook/js/jquery.min.map
138.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/5/media/image00.png
137.5 kB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_3.webm
137.1 kB
2022/SEC565 Workbook/SEC565/workbook/assets/stylesheets/main.644de097.min.css
135.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/pivot1.png
135.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/pivot1.png
135.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/empire/dcsyncsuccess.png
134.6 kB
2022/SEC565 Workbook/SEC565/workbook/resources/img/virtual-machine-credentials/virtual-machine-information-panel-workstation.png
134.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image21.png
132.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image06.png
130.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/altname.png
130.9 kB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_18_2.webm
130.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image13.png
130.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image20.png
128.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image10.png
128.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/wireshark-ssh.png
127.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/spotlight.png
126.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image11.png
126.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/1/media/image02.png
126.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image03.png
126.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/media/image02.png
126.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image02.png
126.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/ftp.png
126.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/ftp.png
126.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/sacrifical.png
125.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/spotlight-plain.png
125.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/childhop/covenant/extrasids.png
125.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/images/vpn-connect.png
125.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image08.png
124.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image10.png
124.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/decrypted.png
124.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/images/test-connect.png
122.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image06.png
121.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image18.png
121.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image03.png
121.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image00.png
119.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image00.png
119.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image06.png
118.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/empire/vulntemplate.png
116.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image15.png
115.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image15.png
115.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image19.png
115.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/5/media/image01.png
115.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image00.png
115.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image00.png
115.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image00.png
115.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/1/media/image00.png
115.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image00.png
115.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/media/image00.png
115.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image00.png
115.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/image00.png
115.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image24.png
114.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image11.png
113.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/image01.png
113.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image13.png
113.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image09.png
112.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/sharphoundtask.png
112.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image01.png
112.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image01.png
112.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image01.png
112.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/1/media/image01.png
112.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image01.png
112.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/media/image01.png
112.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image01.png
112.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/image01.png
112.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/childhop/covenant/dcsync.png
111.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/spawnas.png
111.3 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/bundle.c44cc438.min.js
110.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image27.png
110.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/RSAT-gmsa.png
109.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/covenant/pth.png
109.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/image01.png
106.8 kB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_20.webm
106.5 kB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_21.webm
106.4 kB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_2.webm
106.4 kB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_21.webm
106.2 kB
2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand.webm
106.0 kB
2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_20.webm
105.8 kB
2020/Sec450 Video/Section 1/1.9 DAY 1 SUMMARY/SEC450- SANS OnDemand_4.webm
105.7 kB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_5.webm
105.7 kB
2020/Sec450 Video/Section 1/1.9 DAY 1 SUMMARY/SEC450- SANS OnDemand.webm
105.6 kB
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_24.webm
105.5 kB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_4.webm
105.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image23.png
105.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/stager.png
105.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image09.png
104.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image05.png
104.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image09.png
104.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image01.png
103.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image01.png
103.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image12.png
103.6 kB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand.webm
103.4 kB
2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_14_2.webm
103.3 kB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_26.webm
103.3 kB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_27.webm
103.2 kB
2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_26.webm
103.2 kB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_30_2.webm
103.1 kB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_4.webm
103.1 kB
2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_18.webm
103.0 kB
2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_20_2.webm
102.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image04.png
102.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image04.png
102.5 kB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_13.webm
101.9 kB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_28.webm
101.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/translated-securitydescriptor.png
101.8 kB
2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_13.webm
101.7 kB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_5.webm
101.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image11.png
101.6 kB
2020/Sec450 Video/Section 3/3.9 DAY 3 SUMMARY/SEC450- SANS OnDemand.webm
101.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image09.png
100.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image09.png
100.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/bloodhound-local-admin-information.PNG
100.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/rsat-dns.png
100.1 kB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_30.webm
99.0 kB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_27.webm
98.8 kB
2020/Sec450 Video/Section 2/2.9 DAY 2 SUMMARY/SEC450- SANS OnDemand_3_2.webm
98.8 kB
2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand.webm
98.8 kB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand.webm
98.3 kB
2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand.webm
98.2 kB
2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_5_2.webm
97.9 kB
2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_14.webm
97.9 kB
2020/Sec450 Video/Section 2/2.9 DAY 2 SUMMARY/SEC450- SANS OnDemand_13.webm
97.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image05.png
97.7 kB
2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_3_2.webm
97.1 kB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_25.webm
96.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image07.png
95.8 kB
2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_16_2.webm
95.8 kB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_4.webm
95.6 kB
2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_5.webm
95.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image17.png
95.1 kB
2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_3_2.webm
93.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/pidmimi.png
93.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image25.png
93.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/5/media/image04.png
92.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/covenant/ptt.png
92.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image03.png
92.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/stealtoken.png
91.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image22.png
91.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/wireshark.png
91.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image13-1.png
90.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image11.png
90.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image05.png
89.9 kB
2022/SEC565 Workbook/SEC565/workbook/js/jquery.min.js
89.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image17.png
89.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image11.png
88.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image11.png
88.4 kB
2022/SEC565 Workbook/SEC565/workbook/js/jquery-3.4.1.min.js
88.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/cert.PNG
87.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/media/image10.png
87.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/psremoting.png
86.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image16.png
86.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/media/image09.png
85.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/1/media/image09.png
85.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/decode-base64.png
85.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/1/media/image05.png
84.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/proxychains-rdp.PNG
83.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/successfullrdp.png
83.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/snapin.png
83.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/media/image07.png
82.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image14.png
82.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/maketoken.png
82.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/mac-unzip.png
81.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/mac-mount.png
80.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image10.png
80.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/nc-encrypted.png
80.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/empire/certsuccess.png
80.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/1/media/image07.png
80.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/curl.png
80.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/sacrificalsession.png
79.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/1/media/image06.png
78.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image14.png
78.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image14.png
78.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/mac-mount-plain.png
78.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/sec565.5.1/index.html
78.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image25.png
77.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/childhop/covenant/krbtgt.png
77.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/media/image08.png
77.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/image04.png
76.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/media/image04.png
76.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/processlist.png
74.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image20.png
74.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/media/image06.png
74.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/childhop/empire/draconemkrbtgt.png
74.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor3/empire/dcsyncsuccess.png
74.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image06.png
74.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image10.png
73.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image10.png
73.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adexplorergui.png
72.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/certify.png
71.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/covenant/dcsync.png
71.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/childhop/covenant/trust.png
70.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/gpocomputeradmin.png
70.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/nc-base64.png
69.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image12.png
69.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image12.png
69.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image02.png
69.3 kB
2020/Sec450 Video/Section 1/1.9 DAY 1 SUMMARY/SEC450- SANS OnDemand_3.webm
69.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/pth.png
68.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image13.png
68.3 kB
2022/SEC565 Workbook/SEC565/workbook/js/jquery.fancybox.min.js
68.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/empire/download.png
67.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/covenant/fileshareaccess2.png
67.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/newou.png
67.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/download.png
67.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image28.png
67.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image07.png
66.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/proxychainsconf.png
66.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/proxychainsconf.png
66.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/ipv6.png
66.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/sec565.4.4/index.html
65.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/sharpmove.png
65.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/nc-plain.png
65.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image04.png
65.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/sharpshares.png
64.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/getnetlocalgroupmember.png
64.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image08.png
64.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/image06.png
63.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image13.png
63.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/getdomaingroup.png
62.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/sec565.4.2/index.html
62.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/wheresaved.png
62.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image11.png
62.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor3/empire/spawnas.png
62.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/ptt.png
62.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image12.png
61.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image12.png
61.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image08.png
60.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image12.png
60.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/regloggedon.png
60.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image13.png
60.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image13.png
60.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/newuser.png
60.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image16.png
59.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path3/workaround.png
59.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/getnetlocalgroupmember-remote.png
59.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/rubeus-monitor.png
59.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image07.png
59.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/sec565.2.4/index.html
59.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor4/empire/whiskersuccess.png
59.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/1/media/image03.png
59.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image04.png
59.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/media/image03.png
59.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image03.png
59.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/neo4jconnect.png
59.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/gpocomputeradmin.png
58.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/mac-mounted.png
58.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/users.png
58.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/advancedfeatures.png
58.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/1/media/image04.png
58.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/snmp-diagram.png
57.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/moddedpowerview.png
57.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/mac-mounte-plain.png
56.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/empire/monitor.png
56.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/luid.png
56.7 kB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/ff/494860fa56a838026843de0ba1a04005630e1a
56.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/sec565.3.3/index.html
56.3 kB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_23.webm
55.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image06.png
55.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image06.png
55.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/rubeus.png
55.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/sec565.5.2/index.html
54.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/sec565.1.4/index.html
54.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image05.png
54.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image05.png
54.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/invokerubeus.png
54.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/ipv6-diagram.png
54.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/invoke-mmc20.png
54.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/getnetlocalgroupmember.png
53.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/fgpwpol-rsat2.png
52.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/updatescript.png
52.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/sec565.1.3/index.html
52.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/bloodhound-recruiting-info.PNG
52.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/childhop/empire/extrasids.png
52.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/RSAT-pwpol2.png
52.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/containerprops.png
51.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image07.png
51.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image07.png
51.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image08.png
51.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image08.png
51.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/windows-extract.png
51.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/download.png
51.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/sec565.1.0/index.html
51.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/upload.png
50.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/sec565.2.1/index.html
50.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/mac-open-vm.png
50.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/getnetsession.png
50.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/pwresetneo.png
49.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/covenant/fileshareaccess.png
49.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/windows-extract-plain.png
49.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/properties.png
49.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adexp-trust.png
49.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image04.png
49.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image04.png
49.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/5/sec565.1.5/index.html
48.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/socks-traffic.PNG
48.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/sockstraffic.png
48.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/sacrificalprocess.png
48.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/empire/sacrificial.png
48.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/empire/token.png
48.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/sec565.1.2/index.html
47.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/changerights.png
47.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image07.png
47.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image05.png
47.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/1/sec565.3.1/index.html
47.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/childhop/empire/devsync.png
47.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/1/media/image00.png
47.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor3/empire/pwreset.png
46.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image06.png
46.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/mac-open-vm-plain.png
46.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path3/covenant/servicecreation.png
46.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/regloggedon.png
46.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/invoke-schtasklatmove.png
46.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/covenant/runas.png
46.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/empire/certreq.png
46.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/finder.png
46.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/neo4j-pw.PNG
45.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/getnetloggedonuser.png
45.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image03.png
45.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image03.png
45.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/stealtoken.png
45.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor1/empire/kerberoast.png
45.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/sec565.4.3/index.html
45.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/getnetsession.png
45.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/image02.png
45.4 kB
2022/SEC565 Workbook/SEC565/workbook/assets/stylesheets/main.644de097.min.css.map
45.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor4/empire/whisker.png
45.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path3/empire/standin.png
44.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/dcomgrunt-callback.png
44.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/image04.png
44.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/openssl.PNG
43.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/sec565.3.4/index.html
43.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/covenant/rev2self.png
43.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/empire/dcsync-tbird.png
43.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/sec565.2.5/index.html
43.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/empire/findtemplates.png
43.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/sec565.3.2/index.html
43.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image02.png
42.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image02.png
42.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/servicecreation.png
42.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/net-administrator.png
42.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/1/sec565.1.1/index.html
41.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/sec565.2.2/index.html
41.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/empire/ptt-tbird.png
41.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/DCOMOptions.png
41.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/sec565.2.3/index.html
41.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/agents.PNG
40.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/scmscriptexec.png
40.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/sec565.5.3/index.html
39.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/sec565.5.4/index.html
39.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/asktgt.png
39.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/stager.png
39.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/powerviewcomputer.png
38.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/dcomgrunt.png
38.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/ssh-transfer.png
38.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/childhop/empire/sacrifical.png
38.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor4/empire/rubeus.png
37.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/escalation.png
37.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/windows-poweron.png
37.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/pivot2-diagram.png
36.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor1/covenant/spn.png
36.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/mac-move-file.png
36.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/mac-iso.png
36.6 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/workers/search.5e67fbfe.min.js
36.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/dcsync.png
36.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/empire/spool.png
36.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/rev2self.png
36.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/beacon1-diagram.png
35.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/beacon1-diagram.png
35.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/spoolsample.png
35.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/invokesocks.png
35.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/empire/maketoken.png
35.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/image15.png
34.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/empire/ptt.png
34.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/SharpAdidnsdump.png
33.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/mac-moved-it.png
33.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image03.png
33.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image03.png
33.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path3/covenant/success.png
33.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/socks-proxy-ftp-diagram.png
33.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/socks-proxy-ftp-diagram.png
33.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/covenant/monitor.png
33.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/spawnas2.png
33.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path3/covenant/standin.png
32.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/empire/asktgt-cert.png
32.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/psexec-execution.png
32.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/sharefinder.png
32.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor3/covenant/spawn.png
32.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/winrm.PNG
32.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/psexecgrunt.png
32.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/windows-mount.png
32.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path3/empire/s4u.png
32.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/computer-admodule.png
32.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/powerviewuserenum.png
31.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/covenant/powershellgrunt.png
31.5 kB
2022/SEC565 Workbook/SEC565/workbook/img/SANS-Offensive-Operations-Logo.png
30.6 kB
2022/SEC565 Workbook/SEC565/workbook/resources/syntax/index.html
30.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/image03.png
30.5 kB
2022/SEC565 Workbook/SEC565/workbook/img/SANS-Offensive-Operations_Logo-Web-1.png
30.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor4/covenant/rubeus.png
30.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/image06.png
30.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path3/empire/invokepsexec.png
30.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/covenant/maketoken.png
30.0 kB
2022/SEC565 Workbook/SEC565/workbook/resources/about-labs/index.html
29.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/location.png
29.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/pivot1-diagram.png
29.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/pivot1-diagram.png
29.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/childhop/empire/dcsync.png
29.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/empire/dcsync.png
29.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor3/empire/krbtgt.png
29.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/sharphound.png
29.3 kB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/48/9616ae2cc8cef6b317b082271b78dc1c0260f2
29.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor4/covenant/whisker.png
29.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/covenant/spooler.png
29.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/image00.png
29.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/covenant/sacrificialsession.png
28.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/covenant/rubeus.png
28.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/bastion-diagram-1.png
28.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/bastion-diagram-1.png
28.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor3/covenant/standin.png
28.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/fgpwpol-adfind.png
28.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/listfiles.png
28.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/runas.png
27.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/reverse-socks.PNG
27.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/ghostcontainer.png
27.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/psexec.png
27.7 kB
2022/SEC565 Workbook/SEC565/workbook/index.html
27.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/netlocalgroupcmd.png
27.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adfind1.png
26.9 kB
2022/SEC565 Workbook/SEC565/workbook/resources/license/index.html
26.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/empire/location.png
26.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/socksserver.png
26.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/mmc.PNG
26.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/bloodhound-recruiting.PNG
26.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/covenant/sacrificial.png
26.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/workbook-update.png
26.1 kB
2022/SEC565 Workbook/SEC565/workbook/resources/virtual-machine-credentials/index.html
26.0 kB
2022/SEC565 Workbook/SEC565/workbook/resources/whats-in-media/index.html
25.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/childhop/covenant/sacrificial.png
25.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/sharphound-covenant-download.png
25.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/windows-mounted.png
25.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/redirection.png
25.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/fgpwpol-custom.png
25.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/covenant/monitor.png
25.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/getnetloggedonuser.png
24.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/processlist.png
24.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/windows-openvm.png
23.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/windows-mounted-plain.png
23.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adfind-computers.png
23.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/childhop/empire/trust.png
22.9 kB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/pack/pack-a5835f7443762e31a13a10fffe23d05818565349.idx
22.9 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/tinyseg.js
22.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/covenant/roastticket.png
22.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/windows-iso.png
22.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/covenant/processimpersonation.png
22.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/scmcallback.png
22.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image08.png
21.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/remotingtask.png
21.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adusersandcomputers.png
21.3 kB
2022/SEC565 Workbook/SEC565/workbook/404.html
21.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/LAPS-LAPSToolkit.png
21.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/LAPSToolKit.png
21.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adsi-passwordpolicy.png
21.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/systemgrunt.PNG
21.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/wmi.png
20.7 kB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/pack/pack-8738db4f374c1f90340e72cd7592dc8a00d61e7d.idx
20.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/domainpolicy-powerview.png
20.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/stagerscript.png
20.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/only-it-admodule.png
19.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/smbadexplorer.png
19.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adsi-users.png
18.9 kB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/84/75f97076f26f1850af73353b5d41113cacbec8
18.3 kB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/05/23dc52f56dd3ac1072e7b234d7831c903e448d
18.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/powershellremoting.png
18.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adfind2.png
18.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/image02.png
17.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/fgpwpol-admodule-highpriv.png
17.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/gmsa-powerview.png
17.3 kB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/2c/56dfcc4a6dd315447dae451f939e6c67b810b1
17.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor1/empire/setspn.png
17.1 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.ar.min.js
17.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/deny-all.png
17.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/socksserver.PNG
16.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/powershell.png
16.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/covenant/spool.png
16.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/advanced.png
16.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/httpserver.png
15.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/windows-extract-progress.png
15.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/powerviewtrust.png
15.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/wmic.png
15.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/pwpol-adfind.png
15.0 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.tr.min.js
15.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/gmsa-adfind.png
14.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/windows-extract-destination.png
14.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adfind-trust.png
14.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/psexec.png
14.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/domain-policy-admodule.png
13.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-agents.png
13.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/usersandcomputers.png
13.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/empire/ticket.png
13.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/image09.png
13.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/getnetlocalgroupmember-remote.png
13.5 kB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/e0/2aadd84c3e0afe4f00df88a585f06d37c70aa4
13.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/windows-extract-destination-plain.png
13.2 kB
2022/SEC565 Workbook/SEC565/workbook/css/jquery.fancybox.min.css
12.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/maketoken.png
12.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/fileshareaccess.png
12.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/hraccess.png
12.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-listeners.png
12.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-settings.png
12.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/ssh.png
12.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/psexec-callback.png
11.6 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.es.min.js
11.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/covenant/gruntcheckin.png
11.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-credentials.png
11.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/certreq.png
11.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/changedir.png
11.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/certutil.png
11.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-stagers.png
11.2 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.it.min.js
11.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-modules.png
11.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-upload.png
11.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-users.png
11.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-download.png
11.0 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.ro.min.js
11.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/admodule-users.png
10.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adexp-ldapsearch.png
10.7 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.fr.min.js
10.7 kB
2022/SEC565 Workbook/SEC565/workbook/assets/stylesheets/palette.e6a45f82.min.css
10.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/computeradsi.png
10.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/wmi-callback.png
10.4 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.ru.min.js
10.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-plugins.png
10.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/LAPS-ADFind.png
10.2 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.pt.min.js
10.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/covenant/taskkill.png
9.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/scmcallback.png
9.8 kB
2022/SEC565 Workbook/SEC565/workbook/img/favicon.ico
9.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-actions.png
9.6 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.hu.min.js
9.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-reporting.png
9.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/only-description-users.png
9.4 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.fi.min.js
9.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adsidomainadmin.png
9.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/ou-noprot.png
9.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adsi-passwordpolicy2.png
8.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adsi-trust.png
8.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/fgpwpol-adsi.png
8.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/userui.png
8.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path3/covenant/systemgrunt.png
7.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/gmsa-adsi.png
7.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/admodule-dns.png
7.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/callback-psremote.png
7.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/admodule-trust.png
7.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/wmi-grunt.png
7.1 kB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/ca/84ac1073aae359ac1e5b8f9325870b17e21f23
7.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/replicationrights.png
6.8 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.du.min.js
6.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/gmsa-admodule.png
6.1 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.de.min.js
6.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/LAPS-ADModule.png
6.1 kB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/pack/pack-90b4589ad74a56edf25af390111108b7a85dc922.idx
6.1 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.nl.min.js
6.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adexplorer.png
5.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/LAPS-adsi.png
5.7 kB
2022/SEC565 Workbook/SEC565/workbook/css/html.css
5.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/LAPS-Powerview.png
5.3 kB
2022/SEC565 Workbook/SEC565/workbook/img/sans-logo.png
5.1 kB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/pack/pack-1f71ccc745b2d328a7b9e0611be72e6f5869c7b5.idx
5.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/color-icon.png
4.9 kB
2022/SEC565 Workbook/SEC565/workbook/.git/hooks/pre-rebase.sample
4.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/search-icon.png
4.8 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.no.min.js
4.8 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.da.min.js
4.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/expand-icon.png
4.6 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.sv.min.js
4.5 kB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/pack/pack-03bdfb6e4174a4f0d659f690a6368cd0960936e3.idx
4.3 kB
2022/SEC565 Workbook/SEC565/workbook/.git/logs/HEAD
4.1 kB
2022/SEC565 Workbook/SEC565/workbook/sitemap.xml
3.7 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.stemmer.support.min.js
3.6 kB
2022/SEC565 Workbook/SEC565/workbook/.git/hooks/update.sample
3.6 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.hi.min.js
3.4 kB
2022/SEC565 Workbook/SEC565/workbook/.git/hooks/fsmonitor-watchman.sample
3.3 kB
2022/SEC565 Workbook/SEC565/workbook/assets/stylesheets/palette.e6a45f82.min.css.map
3.2 kB
2022/SEC565 Workbook/SEC565/workbook/resources/create_workbook-update_task.ps1
2.8 kB
2022/SEC565 Workbook/SEC565/workbook/resources/workbook-update.sh
2.3 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.ja.min.js
2.3 kB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/3d/8421e59a505bdf9ba985880eaf6d36aaddbb48
2.1 kB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/ea/fa574bada54914d166fb3acde997aacb0a2a64
2.1 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.zh.min.js
2.1 kB
2022/SEC565 Workbook/SEC565/workbook/img/magnify.png
2.0 kB
2022/SEC565 Workbook/SEC565/workbook/assets/images/favicon.png
1.9 kB
2022/SEC565 Workbook/SEC565/workbook/css/pdf.css
1.9 kB
2022/SEC565 Workbook/SEC565/workbook/.git/hooks/pre-commit.sample
1.6 kB
2022/SEC565 Workbook/SEC565/workbook/.git/hooks/prepare-commit-msg.sample
1.5 kB
2022/SEC565 Workbook/SEC565/workbook/.git/hooks/pre-push.sample
1.3 kB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/2f/8640a031993b3c67512637025321e2b16c3f48
1.1 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.th.min.js
1.0 kB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/53/de862cb943ba1549b3f74dc36915b30d433560
978 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/hooks/commit-msg.sample
896 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/b8/207d92d91c81e2146a51d0ade6e658419d02df
847 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/a3/fc67491d0c0773f5109e11f63e65342ce57223
846 Bytes
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.multi.min.js
817 Bytes
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.vi.min.js
784 Bytes
2022/SEC565 Workbook/SEC565/workbook/css/custom.css
708 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/logs/refs/remotes/origin/H02
655 Bytes
2022/SEC565 Workbook/SEC565/workbook/resources/ewb-update.cron
647 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/logs/refs/heads/H02
630 Bytes
2022/SEC565 Workbook/SEC565/workbook/js/workbook.js
588 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/hooks/pre-receive.sample
544 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/hooks/applypatch-msg.sample
478 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/a1/84b0ce3805d5ad6444ea18f238fb6584ab1f3c
432 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/hooks/pre-applypatch.sample
424 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/da/7d6e61c7d55d668daa9926a6711e1ec00025d4
408 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/e6/b940a862d66a6aa17f0307881cb2727fe826a6
408 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/4e/d2a7607a6682e5935607ca0ca91e0196c8316a
406 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/67/5fdf2b545027596a7b495ace99743303318d01
385 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/0d/edc770eea99e0b5b4669ee41d1a43a517e964f
384 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/9e/9e8ad53c5a50468f8aaf0f6b700669a096db00
383 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/88/c067a6e8d679991490eb03d3d81afc54ced430
383 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/ee/7fd17c297f539e8cc87c62218f16afd02fb1c9
383 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/61/1238327845b03cff69177e2f418eefe07e913d
382 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/b1/da70439c537b4231ac210462ae916498622105
382 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/26/37097d4f94c6abb01a2af700e9c86583f76303
362 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/logs/refs/heads/H01
361 Bytes
2022/SEC565 Workbook/SEC565/workbook/resources/ewb-update.service
353 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/5d/7bc8cb8beef81ca6a47375280d9475aa9a0042
342 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/00/6fd2eb57dbc0e5142ecae18e399a2d04f335fb
291 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/fd/cf45be784b759cc32e53416508c5a942a5f024
291 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/cc/a6c95daae6170e62d10b4ea1afb754c99ce3d2
252 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/02/fed966c84d52b949af3800ebf03aefae36fd27
241 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/info/exclude
240 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/02/d571a5646a1be47b05eacead6838733bcdc45c
235 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/3a/7ba5dc6429f2e9fa3845c637555bf9bd6bad1c
235 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/5f/15446dfcd9929f5cbd8d98233728c8360196b7
235 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/09/b520f06003a8e93757a5a7c9d2526d72b35de7
235 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/17/aaf30eb9fe9b7b491f410725398bb08c0f5835
235 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/27/1557900d2ee8d1528b6d801428f836e8ee89e1
235 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/62/739e4fee5aa66b5be23a5cea1ebc33129d247b
235 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/f3/a5ba4489c938d3d367d4b22fbdddfb92c3a98f
235 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/1f/27b47ff2ba38a5d11b90efe2a9c81f8e296c1d
233 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/84/c38044b8eca9d77261866e1f2139cd7e2f1ba0
232 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/24/d09afff17f71bb288796c414d8f13cabca4d9f
217 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/bd/53ba48ced073cd40e7b9d84d77c3d0b992629a
217 Bytes
2022/SEC565 Workbook/SEC565/workbook/sitemap.xml.gz
216 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/hooks/post-update.sample
189 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/aa/986bb76eac578ad8141d2cbbb87cab69f4a1e8
177 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/af/e8821fddcf33c87a74780fb0b25fbb3a292d98
177 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/logs/refs/remotes/origin/H01
168 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/f6/2c97053b67350781c91022e6c7502732af647d
159 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/98/1b7f78504388ecc59386d784aea66eaf0666ba
158 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/9d/af28ce076c9caefc698d358c1bf2e8d5c51cc7
157 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/14/aab081f4168b1b8ac88d54cab6fce1f917844e
140 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/21/dbd4683f80236d88c6b3fd93b74ce24b2b064c
139 Bytes
2022/SEC565 Workbook/SEC565/workbook/README.md
138 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/38/4ad0535449cd92d4be44bb661904691ecd9f97
138 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/da/0ef3a7397c5983946944fcf189e0c47a4d4680
138 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/c1/5cb6a204f95b4fbffb8f83933d1555049ad286
137 Bytes
2020/Sec450 Video/Section 1/desktop.ini
136 Bytes
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/desktop.ini
136 Bytes
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/desktop.ini
136 Bytes
2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/desktop.ini
136 Bytes
2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/desktop.ini
136 Bytes
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/desktop.ini
136 Bytes
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/desktop.ini
136 Bytes
2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/desktop.ini
136 Bytes
2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/desktop.ini
136 Bytes
2020/Sec450 Video/Section 1/1.9 DAY 1 SUMMARY/desktop.ini
136 Bytes
2020/Sec450 Video/Section 2/desktop.ini
136 Bytes
2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/desktop.ini
136 Bytes
2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/desktop.ini
136 Bytes
2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/desktop.ini
136 Bytes
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/desktop.ini
136 Bytes
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/desktop.ini
136 Bytes
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/desktop.ini
136 Bytes
2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/desktop.ini
136 Bytes
2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/desktop.ini
136 Bytes
2020/Sec450 Video/Section 2/2.9 DAY 2 SUMMARY/desktop.ini
136 Bytes
2020/Sec450 Video/Section 3/desktop.ini
136 Bytes
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/desktop.ini
136 Bytes
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/desktop.ini
136 Bytes
2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/desktop.ini
136 Bytes
2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/desktop.ini
136 Bytes
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/desktop.ini
136 Bytes
2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/desktop.ini
136 Bytes
2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/desktop.ini
136 Bytes
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/desktop.ini
136 Bytes
2020/Sec450 Video/Section 3/3.9 DAY 3 SUMMARY/desktop.ini
136 Bytes
2020/Sec450 Video/Section 4/desktop.ini
136 Bytes
2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/desktop.ini
136 Bytes
2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/desktop.ini
136 Bytes
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/desktop.ini
136 Bytes
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/desktop.ini
136 Bytes
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/desktop.ini
136 Bytes
2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/desktop.ini
136 Bytes
2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/desktop.ini
136 Bytes
2020/Sec450 Video/Section 5/desktop.ini
136 Bytes
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/desktop.ini
136 Bytes
2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/desktop.ini
136 Bytes
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/desktop.ini
136 Bytes
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/desktop.ini
136 Bytes
2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/desktop.ini
136 Bytes
2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/desktop.ini
136 Bytes
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/desktop.ini
136 Bytes
2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/desktop.ini
136 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/76/8d34dbd14477adffedc8bb65d837683a51cccf
124 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/7e/9241be456ba52126ed989fabe0e652c5880159
120 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/2d/998800e82714f9bf49a526dad58579005ce6f8
119 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/68/47174915d557c8625d476e01729b2c1d569fe6
119 Bytes
2022/SEC565 Workbook/SEC565/workbook/js/custom.js
102 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/2f/9135021c129ef110d51ddb8baf22ffcb37aaa1
81 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/3f/e5cbc0b2fb3a786225094600890dca934ec58e
81 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/7c/0638d285788a4719c5e51142e0e4de56b526f1
81 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/24/ad4f7777bd15fc57ef2baea5f0342ca66d1d4b
81 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/f4/4234e84a5e2b1e16ad42692240feecce88b2c9
81 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/4e/d14d631c5f245bba1a0089218b696edf85b181
62 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/8a/7f3976f26e9940fe7e84e5365b1a5b9d5553ca
62 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/c0/d978c3a5b6037cf3bfc471d7904da4811559bd
62 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/2c/7163b45ffd47628c2daa1726b1ae2877193e38
55 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/3e/772c297763593ef17d6d7712a4dec35a6b1b95
55 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/29/25ff65c0d7357e82cd854a97212950c96ea5d5
55 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/43/f529331ee38bf30f496dbfebd10ac244ff41d6
55 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/a9/ec9118fe728cab54b83fcf4738ce1448c9d479
55 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/cc/e1f6306299917e72b85ecd9cb24f676613fdb3
54 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/refs/heads/H01
41 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/refs/heads/H02
41 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/refs/remotes/origin/H01
41 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/refs/remotes/origin/H02
41 Bytes
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.jp.min.js
36 Bytes
2020/Sec450 PDF/PDF Password.txt
21 Bytes
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!
>