搜索
SANS 450 - Blue team fundamentals
磁力链接/BT种子名称
SANS 450 - Blue team fundamentals
磁力链接/BT种子简介
种子哈希:
bc5ff400861123a7af5f101f7951a4b842e7fdcf
文件大小:
33.99G
已经下载:
1166
次
下载速度:
极快
收录时间:
2024-01-06
最近下载:
2026-01-05
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:BC5FF400861123A7AF5F101F7951A4B842E7FDCF
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
世界之窗
小蓝俱乐部
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
母狗园
51动漫
91短视频
抖音Max
海王TV
TikTok成人版
PornHub
暗网Xvideo
草榴社区
哆哔涩漫
呦乐园
萝莉岛
搜同
91暗网
最近搜索
细腰蜜桃臀尤物身材御姐享受变态性爱
曹长卿
sdab-289
kelly+collins+-+kamy-ultrafilms+-+starlight
特写
mdbt2.com
失恋侄子心情不好想要巨乳小姨安慰
学霸妹妹
雨竹先生
私房最新流出黑客【破解摄像头】隆乳整形诊所+家居视频+妇科检查
当着孩子
松川奈奈子
人气艳星顶级媚黑犹如她手臂粗的大黑棍
fc2-ppv-3743390
鸭哥返场极品牛仔裤小萝莉,身材玲珑有致
snis-804
极品高颜值情趣丁字裤美女被男友各种爆日
lexis
我内射你老婆你却只能在事后用嘴清理战场
離島幼女
【weagogo】肛交+
cla314
家族
大学生私房
yuna+tamago+黑丝
爱泄密东北淫荡人妻偷情高潮嚎叫 全程骑乘 这就是招惹东
okad-370
kala.grey
悲伤恋歌
丝+高跟
文件列表
2020/Sec450 Virtual Machine/Sec450 Virtual Machine.iso
17.1 GB
2022/ISO/450.22.1.iso
15.4 GB
2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_21_2.webm
65.1 MB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_22.webm
64.8 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_29.webm
64.1 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_31.webm
62.2 MB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_21_2.webm
53.1 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_26.webm
43.3 MB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/pack/pack-8738db4f374c1f90340e72cd7592dc8a00d61e7d.pack
42.4 MB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand.webm
41.9 MB
2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_15_2.webm
39.5 MB
2020/Sec450 Video/Section 2/2.9 DAY 2 SUMMARY/SEC450- SANS OnDemand_4_2.webm
35.0 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_28.webm
34.6 MB
2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_9.webm
32.6 MB
2020/Sec450 PDF/SEC450 - Workbook.pdf
30.1 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_31_2.webm
28.3 MB
2020/Sec450 Video/Section 1/1.9 DAY 1 SUMMARY/SEC450- SANS OnDemand_5.webm
26.3 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_19_2.webm
25.2 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_20.webm
25.0 MB
2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_17.webm
21.7 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_21.webm
19.4 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_20.webm
19.1 MB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_11.webm
18.8 MB
2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_17_2.webm
18.5 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_2.webm
18.4 MB
2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand_3.webm
17.2 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_23.webm
16.4 MB
2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand_7.webm
15.7 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_11.webm
15.5 MB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_20_2.webm
15.1 MB
2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_5.webm
15.0 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_8.webm
14.8 MB
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_16_2.webm
14.7 MB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/pack/pack-a5835f7443762e31a13a10fffe23d05818565349.pack
14.6 MB
2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_4_2.webm
14.6 MB
2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_7_2.webm
14.1 MB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_13.webm
13.8 MB
2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_15_2.webm
13.7 MB
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_5_2.webm
13.5 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_14.webm
13.4 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_23.webm
13.3 MB
2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_12_2.webm
13.3 MB
2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_13.webm
13.2 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_7.webm
13.1 MB
2022/PDF/SEC450 (2022)/SEC450 - Book 2 (2022).pdf
13.0 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_25.webm
12.8 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_19.webm
12.7 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_19.webm
12.2 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_7.webm
12.2 MB
2020/Sec450 PDF/SEC450 - Book 2.pdf
12.2 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_18.webm
12.1 MB
2022/PDF/SEC450 (2022)/SEC450 - Book 3 (2022).pdf
11.7 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_2.webm
11.6 MB
2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_10.webm
11.5 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_20.webm
11.3 MB
2020/Sec450 Video/Section 3/3.9 DAY 3 SUMMARY/SEC450- SANS OnDemand_3.webm
11.3 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_12.webm
11.3 MB
2022/PDF/SEC450 (2022)/SEC450 - Book 5 (2022).pdf
11.3 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_10.webm
11.2 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_12_2.webm
11.0 MB
2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_13_2.webm
11.0 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_10.webm
11.0 MB
2020/Sec450 PDF/SEC450 - Book 5.pdf
10.9 MB
2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_6.webm
10.9 MB
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_17_2.webm
10.8 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_22_2.webm
10.8 MB
2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_13_2.webm
10.6 MB
2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_5_2.webm
10.5 MB
2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_11.webm
10.5 MB
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_13.webm
10.5 MB
2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_15.webm
10.5 MB
2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_11_2.webm
10.4 MB
2022/PDF/SEC450 (2022)/SEC450 - Book 1 (2022).pdf
10.3 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_20.webm
10.3 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_8.webm
10.2 MB
2020/Sec450 PDF/SEC450 - Book 3.pdf
10.2 MB
2020/Sec450 PDF/SEC450 - Book 1.pdf
10.2 MB
2022/PDF/SEC450 (2022)/SEC450 - Book 4 (2022).pdf
10.2 MB
2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_7_2.webm
10.1 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_29.webm
10.1 MB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_8_2.webm
10.0 MB
2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_2.webm
10.0 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_13.webm
10.0 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_17.webm
9.9 MB
2020/Sec450 PDF/SEC450 - Book 4.pdf
9.8 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_13.webm
9.8 MB
2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_12.webm
9.7 MB
2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_15_2.webm
9.6 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_20.webm
9.5 MB
2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_6_2.webm
9.4 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_10.webm
9.3 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_26.webm
9.3 MB
2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_11_2.webm
9.2 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_18.webm
9.2 MB
2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_9_2.webm
9.2 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_21.webm
9.1 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_6.webm
9.1 MB
2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_8_2.webm
9.0 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_14.webm
9.0 MB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_21.webm
8.8 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_31.webm
8.8 MB
2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_7_2.webm
8.8 MB
2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_9.webm
8.8 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_14_3.webm
8.7 MB
2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_10.webm
8.6 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_17.webm
8.4 MB
2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_9_2.webm
8.4 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_19_2.webm
8.4 MB
2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_4.webm
8.3 MB
2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_8.webm
8.3 MB
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_21_2.webm
8.3 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_19.webm
8.3 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_24.webm
8.2 MB
2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_6.webm
8.2 MB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_18.webm
8.2 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_21_2.webm
8.2 MB
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_15_2.webm
8.2 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_21.webm
8.1 MB
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_17_2.webm
8.0 MB
2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_18_2.webm
8.0 MB
2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_14_2.webm
7.9 MB
2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_16_2.webm
7.7 MB
2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_14_2.webm
7.7 MB
2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_13_2.webm
7.6 MB
2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_15.webm
7.6 MB
2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_2_2.webm
7.6 MB
2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_3_2.webm
7.6 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_26.webm
7.6 MB
2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_4.webm
7.5 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_22.webm
7.5 MB
2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_17.webm
7.5 MB
2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_8_2.webm
7.4 MB
2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_14_2.webm
7.4 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_12.webm
7.4 MB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_18_2.webm
7.4 MB
2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_6_2.webm
7.4 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_25.webm
7.4 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_20_2.webm
7.2 MB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_22.webm
7.2 MB
2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand_10.webm
7.2 MB
2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_6_2.webm
7.1 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_16_2.webm
7.1 MB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_6.webm
7.1 MB
2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_7_2.webm
7.0 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_28.webm
7.0 MB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_18.webm
6.9 MB
2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_20.webm
6.9 MB
2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_5_2.webm
6.9 MB
2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_8_2.webm
6.8 MB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_15.webm
6.8 MB
2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_11_2.webm
6.8 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_11.webm
6.7 MB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_22.webm
6.7 MB
2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_12.webm
6.7 MB
2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_11.webm
6.7 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_19.webm
6.7 MB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_13_3.webm
6.7 MB
2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_8_2.webm
6.7 MB
2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_6.webm
6.7 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_5.webm
6.6 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_4.webm
6.6 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_22.webm
6.6 MB
2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_14.webm
6.5 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_10.webm
6.5 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_11.webm
6.4 MB
2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_6.webm
6.4 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_27.webm
6.4 MB
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_12_2.webm
6.4 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_10_2.webm
6.4 MB
2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_8.webm
6.3 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_12.webm
6.3 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_9_2.webm
6.3 MB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_18.webm
6.3 MB
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_20_2.webm
6.2 MB
2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_8_2.webm
6.2 MB
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_11_2.webm
6.1 MB
2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_6_2.webm
6.1 MB
2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_12.webm
6.1 MB
2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_5.webm
6.1 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_24.webm
6.0 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_14.webm
6.0 MB
2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_4.webm
6.0 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_16.webm
6.0 MB
2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand.webm
6.0 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_5.webm
5.9 MB
2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_2.webm
5.9 MB
2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_15_2.webm
5.9 MB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_14.webm
5.8 MB
2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_10_2.webm
5.8 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_14_2.webm
5.8 MB
2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_17.webm
5.7 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_8.webm
5.7 MB
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_12_2.webm
5.7 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_14.webm
5.7 MB
2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_2_2.webm
5.7 MB
2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_11.webm
5.6 MB
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_7_2.webm
5.6 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_13_2.webm
5.6 MB
2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_11.webm
5.6 MB
2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_15.webm
5.5 MB
2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_10.webm
5.5 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_11.webm
5.5 MB
2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_14_2.webm
5.5 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_23.webm
5.5 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_18.webm
5.5 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_8.webm
5.5 MB
2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_3.webm
5.4 MB
2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_20.webm
5.4 MB
2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_17_2.webm
5.4 MB
2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_3.webm
5.4 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_12.webm
5.4 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_13_2.webm
5.3 MB
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_9_2.webm
5.3 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_23_2.webm
5.3 MB
2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_11.webm
5.2 MB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_10_2.webm
5.2 MB
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_19_2.webm
5.2 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_28.webm
5.2 MB
2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_17.webm
5.2 MB
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_10_2.webm
5.2 MB
2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_10.webm
5.2 MB
2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_21.webm
5.1 MB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_20.webm
5.1 MB
2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_10_2.webm
5.0 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_4_2.webm
5.0 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_18_2.webm
5.0 MB
2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_12.webm
5.0 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_19.webm
5.0 MB
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_14_2.webm
5.0 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_18.webm
5.0 MB
2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_9.webm
4.9 MB
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_11_2.webm
4.9 MB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_4.webm
4.9 MB
2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_7.webm
4.9 MB
2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_3_2.webm
4.9 MB
2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_7.webm
4.9 MB
2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_19.webm
4.9 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_20.webm
4.9 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_17_2.webm
4.8 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_24.webm
4.8 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_6.webm
4.8 MB
2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_15.webm
4.8 MB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_14_2.webm
4.8 MB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_12.webm
4.7 MB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_2.webm
4.7 MB
2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_3.webm
4.7 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_8.webm
4.7 MB
2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_2.webm
4.7 MB
2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_4_2.webm
4.6 MB
2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_10_2.webm
4.6 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_24_2.webm
4.6 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_3.webm
4.6 MB
2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_11_2.webm
4.6 MB
2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_8.webm
4.6 MB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_24.webm
4.6 MB
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_20_2.webm
4.6 MB
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_17_2.webm
4.6 MB
2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_9.webm
4.5 MB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_17_2.webm
4.5 MB
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_5_2.webm
4.5 MB
2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_18_2.webm
4.5 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_13.webm
4.5 MB
2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_7.webm
4.5 MB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_7.webm
4.4 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_22.webm
4.4 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_28.webm
4.4 MB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_7_2.webm
4.4 MB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_17.webm
4.4 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_11.webm
4.4 MB
2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand_5.webm
4.4 MB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_12_2.webm
4.4 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_3_2.webm
4.4 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_12_2.webm
4.4 MB
2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_5.webm
4.3 MB
2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_11_2.webm
4.3 MB
2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_19.webm
4.3 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_17_2.webm
4.3 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_32.webm
4.3 MB
2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_15.webm
4.3 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_17.webm
4.2 MB
2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_16_2.webm
4.2 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_15.webm
4.2 MB
2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_4_2.webm
4.2 MB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_23.webm
4.2 MB
2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_13.webm
4.2 MB
2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_13_3.webm
4.2 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_21.webm
4.2 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_22.webm
4.2 MB
2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_4_2.webm
4.2 MB
2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_9.webm
4.1 MB
2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_14.webm
4.1 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_21.webm
4.1 MB
2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_13.webm
4.1 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_11_2.webm
4.1 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_8.webm
4.1 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_10.webm
4.1 MB
2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_4_3.webm
4.1 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_15.webm
4.1 MB
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_20_2.webm
4.0 MB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_22_2.webm
4.0 MB
2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_12_2.webm
4.0 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_6.webm
4.0 MB
2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_16.webm
4.0 MB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_4_2.webm
4.0 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_2_2.webm
4.0 MB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_15.webm
4.0 MB
2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_3_2.webm
4.0 MB
2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_6.webm
4.0 MB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_4.webm
4.0 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_4_2.webm
4.0 MB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_21.webm
3.9 MB
2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_4.webm
3.9 MB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_23.webm
3.9 MB
2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand_4.webm
3.9 MB
2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_14_2.webm
3.9 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_8_2.webm
3.9 MB
2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_16_2.webm
3.9 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_21_2.webm
3.9 MB
2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_10.webm
3.9 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_12.webm
3.9 MB
2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_9_2.webm
3.8 MB
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_8_2.webm
3.8 MB
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_21_2.webm
3.8 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_26.webm
3.8 MB
2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand_9.webm
3.8 MB
2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_9_2.webm
3.8 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_25.webm
3.8 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_17.webm
3.8 MB
2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_18.webm
3.7 MB
2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_14.webm
3.7 MB
2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_4.webm
3.7 MB
2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_9.webm
3.7 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_24.webm
3.7 MB
2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_10_2.webm
3.7 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_6.webm
3.7 MB
2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_8_2.webm
3.7 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_9.webm
3.7 MB
2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_7.webm
3.7 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_27.webm
3.7 MB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_10.webm
3.7 MB
2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_7_2.webm
3.7 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_6.webm
3.6 MB
2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_3_2.webm
3.6 MB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_16.webm
3.6 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_7.webm
3.6 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_21.webm
3.6 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_4_2.webm
3.6 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_11.webm
3.6 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_13.webm
3.6 MB
2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_18.webm
3.5 MB
2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_19_2.webm
3.5 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_4.webm
3.5 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_15.webm
3.5 MB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_23.webm
3.5 MB
2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_3.webm
3.5 MB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_9_2.webm
3.5 MB
2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_10_2.webm
3.5 MB
2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_4.webm
3.5 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_8_2.webm
3.5 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_7_2.webm
3.5 MB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_14.webm
3.5 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_14_2.webm
3.5 MB
2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_7_2.webm
3.5 MB
2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_14_2.webm
3.4 MB
2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_10_2.webm
3.4 MB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_11_2.webm
3.4 MB
2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_12_2.webm
3.4 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_25_2.webm
3.4 MB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_15.webm
3.4 MB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_24_2.webm
3.4 MB
2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_9_2.webm
3.4 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_31.webm
3.4 MB
2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_18_2.webm
3.4 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_8.webm
3.4 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_18.webm
3.4 MB
2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_16_2.webm
3.4 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_28_2.webm
3.3 MB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_18.webm
3.3 MB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_8.webm
3.3 MB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_10_2.webm
3.3 MB
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_4_2.webm
3.3 MB
2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_8_2.webm
3.3 MB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_9_2.webm
3.3 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_5_2.webm
3.2 MB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_5.webm
3.2 MB
2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_17_2.webm
3.2 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_26.webm
3.2 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_23.webm
3.2 MB
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_19_2.webm
3.2 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_30.webm
3.2 MB
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_18_2.webm
3.2 MB
2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_10.webm
3.2 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_24.webm
3.2 MB
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_16_2.webm
3.2 MB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_7_2.webm
3.2 MB
2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_5.webm
3.2 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_19.webm
3.2 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_13.webm
3.1 MB
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_7_2.webm
3.1 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_16.webm
3.1 MB
2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand_11.webm
3.1 MB
2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_9_2.webm
3.1 MB
2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_15_2.webm
3.1 MB
2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_5_2.webm
3.1 MB
2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_13_2.webm
3.1 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_15.webm
3.1 MB
2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_12_2.webm
3.1 MB
2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_11_2.webm
3.1 MB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_17.webm
3.1 MB
2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_5_2.webm
3.1 MB
2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_4_2.webm
3.1 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_4.webm
3.1 MB
2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_18_2.webm
3.1 MB
2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_6_2.webm
3.1 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_6_2.webm
3.1 MB
2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_2_2.webm
3.1 MB
2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_17.webm
3.1 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_20.webm
3.1 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_11_2.webm
3.0 MB
2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_15_2.webm
3.0 MB
2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_10.webm
3.0 MB
2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_8.webm
3.0 MB
2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_5_2.webm
3.0 MB
2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_12_2.webm
3.0 MB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_14.webm
3.0 MB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_6_2.webm
3.0 MB
2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_9_2.webm
3.0 MB
2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_7.webm
3.0 MB
2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_16.webm
3.0 MB
2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_10_2.webm
3.0 MB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_14.webm
3.0 MB
2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_5_2.webm
3.0 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_19.webm
3.0 MB
2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_4_2.webm
3.0 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_14.webm
3.0 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_20.webm
3.0 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_25.webm
2.9 MB
2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_11_2.webm
2.9 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_25.webm
2.9 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_22.webm
2.9 MB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_5_2.webm
2.9 MB
2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_20_2.webm
2.9 MB
2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_16.webm
2.9 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_15_2.webm
2.9 MB
2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_6.webm
2.9 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_5_2.webm
2.9 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_18_2.webm
2.9 MB
2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_14.webm
2.9 MB
2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_20_2.webm
2.9 MB
2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_14.webm
2.9 MB
2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_10_2.webm
2.9 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_9.webm
2.9 MB
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_14_2.webm
2.9 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_29.webm
2.8 MB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/pack/pack-03bdfb6e4174a4f0d659f690a6368cd0960936e3.pack
2.8 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_9.webm
2.8 MB
2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_4_2.webm
2.8 MB
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_3_2.webm
2.8 MB
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_3.webm
2.8 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_3.webm
2.8 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_7.webm
2.8 MB
2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_13_2.webm
2.8 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_10.webm
2.8 MB
2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_15_2.webm
2.8 MB
2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_5.webm
2.8 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_4.webm
2.8 MB
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_6_2.webm
2.8 MB
2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_18.webm
2.8 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_23.webm
2.8 MB
2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_19.webm
2.8 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_3_2.webm
2.8 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_14.webm
2.7 MB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_3_2.webm
2.7 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_4.webm
2.7 MB
2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_6_2.webm
2.7 MB
2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_3_2.webm
2.7 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_23.webm
2.7 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_5.webm
2.7 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_12.webm
2.7 MB
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_3_2.webm
2.7 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_27.webm
2.7 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_27.webm
2.7 MB
2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_6.webm
2.7 MB
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_22_2.webm
2.7 MB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_10.webm
2.7 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_17.webm
2.7 MB
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_10_2.webm
2.7 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_15_2.webm
2.7 MB
2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_11_2.webm
2.7 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_30.webm
2.7 MB
2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_7.webm
2.6 MB
2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_2_2.webm
2.6 MB
2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_16_2.webm
2.6 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_7_2.webm
2.6 MB
2020/Sec450 Video/Section 1/1.9 DAY 1 SUMMARY/SEC450- SANS OnDemand_2.webm
2.6 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_10.webm
2.6 MB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_5_2.webm
2.6 MB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_2_2.webm
2.6 MB
2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_13.webm
2.6 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_16.webm
2.6 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_17.webm
2.6 MB
2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_7_2.webm
2.5 MB
2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_2_2.webm
2.5 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_9.webm
2.5 MB
2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_2.webm
2.5 MB
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_13_2.webm
2.5 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_23.webm
2.5 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_15.webm
2.5 MB
2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_7.webm
2.5 MB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_8_2.webm
2.5 MB
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_15_2.webm
2.5 MB
2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_12_2.webm
2.4 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_16.webm
2.4 MB
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_4_3.webm
2.4 MB
2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_19.webm
2.4 MB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_3_2.webm
2.4 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_10_2.webm
2.4 MB
2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_13.webm
2.4 MB
2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_12.webm
2.4 MB
2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_7_2.webm
2.4 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_15.webm
2.4 MB
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_5_2.webm
2.4 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_24.webm
2.4 MB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_16_2.webm
2.4 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_26_2.webm
2.4 MB
2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_9_2.webm
2.4 MB
2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_5.webm
2.4 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_11.webm
2.4 MB
2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_2_2.webm
2.4 MB
2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_4_2.webm
2.3 MB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_12.webm
2.3 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_29.webm
2.3 MB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_7.webm
2.3 MB
2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_12.webm
2.3 MB
2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_10_2.webm
2.3 MB
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_18_2.webm
2.3 MB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_3.webm
2.3 MB
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_18_2.webm
2.3 MB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_19.webm
2.3 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_19_2.webm
2.3 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_3.webm
2.2 MB
2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_6_2.webm
2.2 MB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_11.webm
2.2 MB
2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_3.webm
2.2 MB
2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_13_2.webm
2.2 MB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_17.webm
2.2 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_16.webm
2.2 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_16.webm
2.2 MB
2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_13.webm
2.2 MB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_10.webm
2.2 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_3.webm
2.2 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_5.webm
2.2 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_3_2.webm
2.1 MB
2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_8_2.webm
2.1 MB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_16.webm
2.1 MB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_19.webm
2.1 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_22.webm
2.1 MB
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_2_2.webm
2.1 MB
2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_13_2.webm
2.1 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_16_2.webm
2.1 MB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_11_2.webm
2.1 MB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_22.webm
2.1 MB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_8.webm
2.1 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_6.webm
2.1 MB
2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_21_2.webm
2.1 MB
2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_13_2.webm
2.1 MB
2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_10.webm
2.1 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_9.webm
2.1 MB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_9.webm
2.0 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_6.webm
2.0 MB
2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_12_2.webm
2.0 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_17_2.webm
2.0 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_5.webm
2.0 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_26_3.webm
2.0 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_7.webm
2.0 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_16.webm
2.0 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_28.webm
2.0 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_14.webm
2.0 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_21.webm
2.0 MB
2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_2.webm
2.0 MB
2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_3_2.webm
2.0 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_20_2.webm
2.0 MB
2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_14_2.webm
2.0 MB
2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand_12.webm
2.0 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_15.webm
2.0 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_3_2.webm
2.0 MB
2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_6_2.webm
2.0 MB
2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_5_2.webm
1.9 MB
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_10_2.webm
1.9 MB
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_16_2.webm
1.9 MB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_15.webm
1.9 MB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_17.webm
1.9 MB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_20.webm
1.9 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_2.webm
1.9 MB
2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_3_2.webm
1.9 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_24_2.webm
1.9 MB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_6.webm
1.9 MB
2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_5_2.webm
1.9 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_9.webm
1.9 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_8.webm
1.9 MB
2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_7_2.webm
1.9 MB
2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_14_2.webm
1.9 MB
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_11_2.webm
1.8 MB
2020/Sec450 Video/Section 3/3.9 DAY 3 SUMMARY/SEC450- SANS OnDemand_2.webm
1.8 MB
2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_11_2.webm
1.8 MB
2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_7.webm
1.8 MB
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_2.webm
1.8 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_13_2.webm
1.8 MB
2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_13.webm
1.8 MB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_23_2.webm
1.8 MB
2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_5.webm
1.8 MB
2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_20_2.webm
1.8 MB
2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_12.webm
1.8 MB
2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_2_2.webm
1.8 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_22_2.webm
1.8 MB
2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_9.webm
1.8 MB
2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand_2.webm
1.8 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_26.webm
1.8 MB
2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_4_2.webm
1.8 MB
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_12_2.webm
1.8 MB
2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_4_3.webm
1.8 MB
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_14_2.webm
1.8 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_22.webm
1.7 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_17_2.webm
1.7 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_11.webm
1.7 MB
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_9_2.webm
1.7 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_13_2.webm
1.7 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_4_2.webm
1.7 MB
2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand_8.webm
1.7 MB
2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_15.webm
1.7 MB
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_8_2.webm
1.7 MB
2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_6_2.webm
1.7 MB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand.webm
1.7 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_18.webm
1.7 MB
2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_12_2.webm
1.7 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_2.webm
1.7 MB
2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_11.webm
1.7 MB
2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_12_2.webm
1.7 MB
2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_13.webm
1.7 MB
2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_8.webm
1.7 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_2_2.webm
1.7 MB
2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_3_2.webm
1.6 MB
2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_8.webm
1.6 MB
2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_9.webm
1.6 MB
2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_6.webm
1.6 MB
2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_10_2.webm
1.6 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_25.webm
1.6 MB
2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_30.webm
1.6 MB
2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_2.webm
1.6 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_2_2.webm
1.6 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_7.webm
1.6 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_24.webm
1.6 MB
2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_12.webm
1.6 MB
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_6_2.webm
1.6 MB
2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_2_2.webm
1.6 MB
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_22_2.webm
1.5 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_6.webm
1.5 MB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_3.webm
1.5 MB
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_22_2.webm
1.5 MB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_16.webm
1.5 MB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_2_2.webm
1.5 MB
2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_17.webm
1.5 MB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_12_2.webm
1.5 MB
2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_14.webm
1.5 MB
2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_11.webm
1.5 MB
2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_2_2.webm
1.5 MB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_18.webm
1.5 MB
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_21_2.webm
1.5 MB
2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_6_2.webm
1.5 MB
2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_19_2.webm
1.5 MB
2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_12.webm
1.5 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_9_2 (1).webm
1.5 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_9_2.webm
1.5 MB
2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_15_2.webm
1.5 MB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_27.webm
1.5 MB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_13.webm
1.5 MB
2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_3_2.webm
1.4 MB
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_6_2.webm
1.4 MB
2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_8_2.webm
1.4 MB
2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_8_2.webm
1.4 MB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_11.webm
1.4 MB
2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_15.webm
1.4 MB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/pack/pack-90b4589ad74a56edf25af390111108b7a85dc922.pack
1.4 MB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_12.webm
1.4 MB
2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_11_2.webm
1.4 MB
2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_2.webm
1.4 MB
2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_18.webm
1.4 MB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_4_2.webm
1.4 MB
2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_19_2.webm
1.4 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_12.webm
1.4 MB
2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_4_2.webm
1.4 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_29_2.webm
1.4 MB
2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_5_2.webm
1.4 MB
2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_8_2.webm
1.4 MB
2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_17.webm
1.3 MB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_2.webm
1.3 MB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_15_2.webm
1.3 MB
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_7_2.webm
1.3 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_22.webm
1.3 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_9.webm
1.3 MB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_6_2.webm
1.3 MB
2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_11_2.webm
1.3 MB
2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_2_2.webm
1.3 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand.webm
1.3 MB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/pack/pack-1f71ccc745b2d328a7b9e0611be72e6f5869c7b5.pack
1.3 MB
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_2_2.webm
1.3 MB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_9.webm
1.3 MB
2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_2_2.webm
1.3 MB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_15_2.webm
1.3 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_2.webm
1.3 MB
2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_19_2.webm
1.3 MB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_16_2.webm
1.3 MB
2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_3.webm
1.3 MB
2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_19.webm
1.3 MB
2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_13_2.webm
1.3 MB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_6.webm
1.3 MB
2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_17_2.webm
1.2 MB
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_4_2.webm
1.2 MB
2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_12_2.webm
1.2 MB
2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_16.webm
1.2 MB
2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_2.webm
1.2 MB
2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_2_2.webm
1.2 MB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_12.webm
1.2 MB
2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_9_2.webm
1.2 MB
2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_5_2.webm
1.2 MB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_26.webm
1.2 MB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_25_2.webm
1.2 MB
2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_8.webm
1.2 MB
2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_11.webm
1.2 MB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_19.webm
1.2 MB
2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_16.webm
1.2 MB
2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_6_2.webm
1.2 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_23_2.webm
1.1 MB
2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_5_2.webm
1.1 MB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_19_2.webm
1.1 MB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_7.webm
1.1 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_10.webm
1.1 MB
2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_4_2.webm
1.1 MB
2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_21.webm
1.1 MB
2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_17_2.webm
1.1 MB
2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_3_2.webm
1.1 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_24.webm
1.1 MB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_5.webm
1.1 MB
2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand.webm
1.1 MB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_13_2.webm
1.0 MB
2020/Sec450 Video/Section 2/2.9 DAY 2 SUMMARY/SEC450- SANS OnDemand_2_2.webm
1.0 MB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_2_2.webm
1.0 MB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_32.webm
1.0 MB
2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_30.webm
1.0 MB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_23.webm
1.0 MB
2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_12_2.webm
998.0 kB
2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand_6.webm
997.4 kB
2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_20.webm
995.5 kB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_9.webm
992.0 kB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_6_2.webm
988.3 kB
2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_10_2.webm
974.1 kB
2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_18.webm
973.3 kB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_5.webm
962.2 kB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_5.webm
960.4 kB
2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_4.webm
957.5 kB
2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_3.webm
947.8 kB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_9.webm
946.2 kB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_3.webm
919.0 kB
2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_16.webm
917.0 kB
2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_7_2.webm
904.1 kB
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_15_2.webm
900.0 kB
2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_13_2.webm
891.3 kB
2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_14.webm
889.1 kB
2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_6_2.webm
887.5 kB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_20.webm
884.0 kB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand.webm
882.8 kB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_28.webm
864.0 kB
2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_7.webm
859.3 kB
2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_16.webm
857.4 kB
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_13_2.webm
852.1 kB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_27_2.webm
848.0 kB
2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_8.webm
845.1 kB
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_9_2.webm
841.8 kB
2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_19.webm
839.0 kB
2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_9_2.webm
827.8 kB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_7.webm
823.2 kB
2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_13_2.webm
819.5 kB
2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_14_2.webm
782.7 kB
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_19_2.webm
774.4 kB
2022/SEC565 Workbook/SEC565/workbook/search/search_index.json
757.1 kB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_19.webm
754.2 kB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_8.webm
750.8 kB
2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_29.webm
739.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/vt-capable.png
738.6 kB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_7.webm
721.3 kB
2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_11.webm
690.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image02.png
687.4 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/wordcut.js
677.5 kB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_13.webm
674.1 kB
2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_7_2.webm
673.5 kB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_2.webm
655.0 kB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_3.webm
631.7 kB
2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_9_2.webm
605.0 kB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand.webm
578.7 kB
2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_14.webm
557.0 kB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_24.webm
555.3 kB
2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_9.webm
551.9 kB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_16.webm
535.8 kB
2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand.webm
529.9 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/bundle.c44cc438.min.js.map
527.2 kB
2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_3.webm
519.8 kB
2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_4.webm
460.2 kB
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_32.webm
458.0 kB
2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand.webm
449.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image10.png
434.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image05.png
417.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/rubeusinput.png
412.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path3/covenant/s4u.png
408.7 kB
2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_6.webm
387.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/copied-it.png
373.6 kB
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_8_2.webm
371.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor4/covenant/whiskersuccess.png
366.0 kB
2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_8.webm
340.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/formatting.png
331.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image09.png
322.8 kB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_21.webm
321.8 kB
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_29.webm
316.0 kB
2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_10.webm
314.1 kB
2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand.webm
312.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image06.png
305.7 kB
2022/SEC565 Workbook/SEC565/workbook/resources/img/virtual-machine-credentials/virtual-machine-information-panel-fusion.png
305.2 kB
2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_16.webm
301.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/empire/certpem.png
301.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image10.png
298.5 kB
2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_15.webm
297.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/covenant/ticket.png
296.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/gui-replication.png
294.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/fgpwpol-adexplorer.png
288.7 kB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_13.webm
285.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/covenant/rubeus.png
283.4 kB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand.webm
277.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/LAPS-ADExplorer.png
276.4 kB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand.webm
274.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/webpage.png
269.3 kB
2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_4_2.webm
266.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image09.png
266.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/image03.png
265.8 kB
2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_17.webm
262.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor4/covenant/ntlm.png
262.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image04.png
261.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adexplorer-gmsa.png
259.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image15.png
255.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adexplorer-pwpol.png
255.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/asktgt2.png
253.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/image05.png
242.8 kB
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand.webm
237.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image08.png
234.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/snmp.png
233.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adexplorer-computeraccounts.png
231.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image07.png
231.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image12.png
229.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image08.png
228.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/image08.png
227.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor1/empire/kerberoast-ticket.png
227.0 kB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_4.webm
226.0 kB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_25.webm
224.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adexplorerusers.png
223.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image23.png
221.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image22.png
217.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image21.png
217.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/ptt.png
216.4 kB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_25.webm
215.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image00.png
211.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image05.png
209.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/5/media/image02.png
208.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/GPO-RSAT.png
206.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/covenant/ticket.png
205.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/covenant/cracked.png
202.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image18.png
201.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/ticket.png
201.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/fgpwpol-rsat1.png
201.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image04.png
198.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/covenant/ptt.png
197.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/neo4j.png
194.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image14.png
194.1 kB
2022/SEC565 Workbook/SEC565/workbook/resources/img/webshell.png
193.0 kB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_29.webm
192.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image19.png
191.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor4/empire/ntlm.png
189.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/rdp-success.PNG
187.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/pivot1-ifconfig.png
186.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/pivot1-ifconfig.png
186.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/jumphost.png
185.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/sharpview-groupenum.png
184.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/workbook.png
179.8 kB
2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand.webm
179.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/image05.png
175.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image24.png
175.8 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/workers/search.5e67fbfe.min.js.map
173.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/output.png
172.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor1/covenant/roast.png
172.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/GPO-RSAT2.png
171.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/wireshark-encrypted.png
170.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image26.png
170.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image14.png
170.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/ssh-bastion.png
169.1 kB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/93/3b9823bd803b0e52d60d26505b12ddb500a6fe
167.1 kB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/26/a2ff5efa99622c7bf7d8b6853885fc3af41cd3
166.9 kB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/3c/4617241c5a0ddbb53b50fc62b7a346549cd939
166.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image02.png
163.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/krbtgt.png
160.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/ssh-bastion.png
159.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/ftp-get-key.png
157.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image11.png
157.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/fit-window.png
156.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/certgen.png
156.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/covenant/tgt.png
156.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image01.png
155.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/covenant/hraccess.png
155.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image29.png
154.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image09.png
153.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/covenant/dcsync.png
153.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor3/covenant/dcsync.png
152.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/computermmc.png
152.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/wireshark-base64.png
151.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/displays.png
149.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image02.png
149.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image02.png
149.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/RSAT-pwpol.png
148.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/1/media/image08.png
147.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/krbtgt.png
147.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image15.png
147.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/sharphound-covenant.png
145.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/proxychains.png
145.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/proxychains.png
145.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/media/image05.png
144.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/sec565.4.1/index.html
143.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image07.png
143.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/5/media/image03.png
141.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/vulntemplate.png
140.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/beacon1.png
140.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/beacon1.png
140.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/image07.png
139.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/wireshark-certreq.png
139.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image10.png
138.8 kB
2022/SEC565 Workbook/SEC565/workbook/js/jquery.min.map
138.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/5/media/image00.png
137.5 kB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_3.webm
137.1 kB
2022/SEC565 Workbook/SEC565/workbook/assets/stylesheets/main.644de097.min.css
135.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/pivot1.png
135.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/pivot1.png
135.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/empire/dcsyncsuccess.png
134.6 kB
2022/SEC565 Workbook/SEC565/workbook/resources/img/virtual-machine-credentials/virtual-machine-information-panel-workstation.png
134.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image21.png
132.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image06.png
130.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/altname.png
130.9 kB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_18_2.webm
130.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image13.png
130.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image20.png
128.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image10.png
128.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/wireshark-ssh.png
127.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/spotlight.png
126.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image11.png
126.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/1/media/image02.png
126.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image03.png
126.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/media/image02.png
126.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image02.png
126.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/ftp.png
126.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/ftp.png
126.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/sacrifical.png
125.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/spotlight-plain.png
125.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/childhop/covenant/extrasids.png
125.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/images/vpn-connect.png
125.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image08.png
124.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image10.png
124.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/decrypted.png
124.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/images/test-connect.png
122.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image06.png
121.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image18.png
121.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image03.png
121.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image00.png
119.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image00.png
119.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image06.png
118.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/empire/vulntemplate.png
116.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image15.png
115.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image15.png
115.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image19.png
115.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/5/media/image01.png
115.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image00.png
115.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image00.png
115.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image00.png
115.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/1/media/image00.png
115.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image00.png
115.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/media/image00.png
115.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image00.png
115.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/image00.png
115.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image24.png
114.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image11.png
113.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/image01.png
113.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image13.png
113.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image09.png
112.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/sharphoundtask.png
112.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image01.png
112.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image01.png
112.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image01.png
112.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/1/media/image01.png
112.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image01.png
112.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/media/image01.png
112.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image01.png
112.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/image01.png
112.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/childhop/covenant/dcsync.png
111.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/spawnas.png
111.3 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/bundle.c44cc438.min.js
110.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image27.png
110.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/RSAT-gmsa.png
109.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/covenant/pth.png
109.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/image01.png
106.8 kB
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_20.webm
106.5 kB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_21.webm
106.4 kB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_2.webm
106.4 kB
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_21.webm
106.2 kB
2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand.webm
106.0 kB
2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_20.webm
105.8 kB
2020/Sec450 Video/Section 1/1.9 DAY 1 SUMMARY/SEC450- SANS OnDemand_4.webm
105.7 kB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_5.webm
105.7 kB
2020/Sec450 Video/Section 1/1.9 DAY 1 SUMMARY/SEC450- SANS OnDemand.webm
105.6 kB
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_24.webm
105.5 kB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_4.webm
105.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image23.png
105.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/stager.png
105.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image09.png
104.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image05.png
104.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image09.png
104.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image01.png
103.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image01.png
103.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image12.png
103.6 kB
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand.webm
103.4 kB
2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_14_2.webm
103.3 kB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_26.webm
103.3 kB
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_27.webm
103.2 kB
2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_26.webm
103.2 kB
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_30_2.webm
103.1 kB
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_4.webm
103.1 kB
2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_18.webm
103.0 kB
2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_20_2.webm
102.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image04.png
102.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image04.png
102.5 kB
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_13.webm
101.9 kB
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_28.webm
101.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/translated-securitydescriptor.png
101.8 kB
2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_13.webm
101.7 kB
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_5.webm
101.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image11.png
101.6 kB
2020/Sec450 Video/Section 3/3.9 DAY 3 SUMMARY/SEC450- SANS OnDemand.webm
101.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image09.png
100.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image09.png
100.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/bloodhound-local-admin-information.PNG
100.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/rsat-dns.png
100.1 kB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_30.webm
99.0 kB
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_27.webm
98.8 kB
2020/Sec450 Video/Section 2/2.9 DAY 2 SUMMARY/SEC450- SANS OnDemand_3_2.webm
98.8 kB
2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand.webm
98.8 kB
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand.webm
98.3 kB
2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand.webm
98.2 kB
2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_5_2.webm
97.9 kB
2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_14.webm
97.9 kB
2020/Sec450 Video/Section 2/2.9 DAY 2 SUMMARY/SEC450- SANS OnDemand_13.webm
97.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image05.png
97.7 kB
2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_3_2.webm
97.1 kB
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_25.webm
96.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image07.png
95.8 kB
2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_16_2.webm
95.8 kB
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_4.webm
95.6 kB
2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_5.webm
95.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image17.png
95.1 kB
2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_3_2.webm
93.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/pidmimi.png
93.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image25.png
93.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/5/media/image04.png
92.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/covenant/ptt.png
92.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image03.png
92.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/stealtoken.png
91.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image22.png
91.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/wireshark.png
91.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image13-1.png
90.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image11.png
90.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image05.png
89.9 kB
2022/SEC565 Workbook/SEC565/workbook/js/jquery.min.js
89.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image17.png
89.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image11.png
88.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image11.png
88.4 kB
2022/SEC565 Workbook/SEC565/workbook/js/jquery-3.4.1.min.js
88.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/cert.PNG
87.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/media/image10.png
87.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/psremoting.png
86.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image16.png
86.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/media/image09.png
85.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/1/media/image09.png
85.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/decode-base64.png
85.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/1/media/image05.png
84.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/proxychains-rdp.PNG
83.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/successfullrdp.png
83.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/snapin.png
83.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/media/image07.png
82.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image14.png
82.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/maketoken.png
82.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/mac-unzip.png
81.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/mac-mount.png
80.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image10.png
80.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/nc-encrypted.png
80.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/empire/certsuccess.png
80.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/1/media/image07.png
80.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/curl.png
80.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/sacrificalsession.png
79.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/1/media/image06.png
78.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image14.png
78.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image14.png
78.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/mac-mount-plain.png
78.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/sec565.5.1/index.html
78.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image25.png
77.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/childhop/covenant/krbtgt.png
77.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/media/image08.png
77.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/image04.png
76.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/media/image04.png
76.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/processlist.png
74.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image20.png
74.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/media/image06.png
74.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/childhop/empire/draconemkrbtgt.png
74.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor3/empire/dcsyncsuccess.png
74.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image06.png
74.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image10.png
73.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image10.png
73.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adexplorergui.png
72.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/certify.png
71.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/covenant/dcsync.png
71.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/childhop/covenant/trust.png
70.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/gpocomputeradmin.png
70.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/nc-base64.png
69.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image12.png
69.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image12.png
69.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image02.png
69.3 kB
2020/Sec450 Video/Section 1/1.9 DAY 1 SUMMARY/SEC450- SANS OnDemand_3.webm
69.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/pth.png
68.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image13.png
68.3 kB
2022/SEC565 Workbook/SEC565/workbook/js/jquery.fancybox.min.js
68.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/empire/download.png
67.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/covenant/fileshareaccess2.png
67.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/newou.png
67.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/download.png
67.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image28.png
67.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image07.png
66.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/proxychainsconf.png
66.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/proxychainsconf.png
66.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/ipv6.png
66.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/sec565.4.4/index.html
65.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/sharpmove.png
65.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/nc-plain.png
65.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image04.png
65.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/sharpshares.png
64.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/getnetlocalgroupmember.png
64.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image08.png
64.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/image06.png
63.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image13.png
63.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/getdomaingroup.png
62.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/sec565.4.2/index.html
62.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/wheresaved.png
62.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image11.png
62.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor3/empire/spawnas.png
62.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/ptt.png
62.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image12.png
61.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image12.png
61.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image08.png
60.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image12.png
60.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/regloggedon.png
60.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image13.png
60.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image13.png
60.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/newuser.png
60.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image16.png
59.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path3/workaround.png
59.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/getnetlocalgroupmember-remote.png
59.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/rubeus-monitor.png
59.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image07.png
59.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/sec565.2.4/index.html
59.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor4/empire/whiskersuccess.png
59.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/1/media/image03.png
59.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image04.png
59.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/media/image03.png
59.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image03.png
59.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/neo4jconnect.png
59.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/gpocomputeradmin.png
58.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/mac-mounted.png
58.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/users.png
58.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/advancedfeatures.png
58.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/1/media/image04.png
58.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/snmp-diagram.png
57.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/moddedpowerview.png
57.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/mac-mounte-plain.png
56.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/empire/monitor.png
56.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/luid.png
56.7 kB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/ff/494860fa56a838026843de0ba1a04005630e1a
56.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/sec565.3.3/index.html
56.3 kB
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_23.webm
55.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image06.png
55.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image06.png
55.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/rubeus.png
55.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/sec565.5.2/index.html
54.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/sec565.1.4/index.html
54.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image05.png
54.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image05.png
54.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/invokerubeus.png
54.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/ipv6-diagram.png
54.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/invoke-mmc20.png
54.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/getnetlocalgroupmember.png
53.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/fgpwpol-rsat2.png
52.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/updatescript.png
52.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/sec565.1.3/index.html
52.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/bloodhound-recruiting-info.PNG
52.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/childhop/empire/extrasids.png
52.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/RSAT-pwpol2.png
52.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/containerprops.png
51.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image07.png
51.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image07.png
51.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image08.png
51.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image08.png
51.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/windows-extract.png
51.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/download.png
51.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/sec565.1.0/index.html
51.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/upload.png
50.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/sec565.2.1/index.html
50.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/mac-open-vm.png
50.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/getnetsession.png
50.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/pwresetneo.png
49.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/covenant/fileshareaccess.png
49.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/windows-extract-plain.png
49.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/properties.png
49.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adexp-trust.png
49.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image04.png
49.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image04.png
49.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/5/sec565.1.5/index.html
48.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/socks-traffic.PNG
48.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/sockstraffic.png
48.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/sacrificalprocess.png
48.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/empire/sacrificial.png
48.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/empire/token.png
48.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/sec565.1.2/index.html
47.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/changerights.png
47.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image07.png
47.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image05.png
47.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/1/sec565.3.1/index.html
47.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/childhop/empire/devsync.png
47.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/1/media/image00.png
47.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor3/empire/pwreset.png
46.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image06.png
46.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/mac-open-vm-plain.png
46.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path3/covenant/servicecreation.png
46.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/regloggedon.png
46.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/invoke-schtasklatmove.png
46.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/covenant/runas.png
46.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/empire/certreq.png
46.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/finder.png
46.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/neo4j-pw.PNG
45.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/getnetloggedonuser.png
45.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image03.png
45.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image03.png
45.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/stealtoken.png
45.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor1/empire/kerberoast.png
45.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/sec565.4.3/index.html
45.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/getnetsession.png
45.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/image02.png
45.4 kB
2022/SEC565 Workbook/SEC565/workbook/assets/stylesheets/main.644de097.min.css.map
45.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor4/empire/whisker.png
45.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path3/empire/standin.png
44.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/dcomgrunt-callback.png
44.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/image04.png
44.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/openssl.PNG
43.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/sec565.3.4/index.html
43.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/covenant/rev2self.png
43.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/empire/dcsync-tbird.png
43.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/sec565.2.5/index.html
43.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/empire/findtemplates.png
43.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/sec565.3.2/index.html
43.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image02.png
42.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image02.png
42.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/servicecreation.png
42.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/net-administrator.png
42.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/1/sec565.1.1/index.html
41.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/sec565.2.2/index.html
41.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/empire/ptt-tbird.png
41.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/DCOMOptions.png
41.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/sec565.2.3/index.html
41.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/agents.PNG
40.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/scmscriptexec.png
40.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/sec565.5.3/index.html
39.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/sec565.5.4/index.html
39.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/asktgt.png
39.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/stager.png
39.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/powerviewcomputer.png
38.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/dcomgrunt.png
38.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/ssh-transfer.png
38.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/childhop/empire/sacrifical.png
38.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor4/empire/rubeus.png
37.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/escalation.png
37.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/windows-poweron.png
37.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/pivot2-diagram.png
36.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor1/covenant/spn.png
36.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/mac-move-file.png
36.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/mac-iso.png
36.6 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/workers/search.5e67fbfe.min.js
36.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/dcsync.png
36.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/empire/spool.png
36.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/rev2self.png
36.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/beacon1-diagram.png
35.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/beacon1-diagram.png
35.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/spoolsample.png
35.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/invokesocks.png
35.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/empire/maketoken.png
35.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/image15.png
34.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/empire/ptt.png
34.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/SharpAdidnsdump.png
33.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/mac-moved-it.png
33.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image03.png
33.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image03.png
33.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path3/covenant/success.png
33.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/socks-proxy-ftp-diagram.png
33.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/socks-proxy-ftp-diagram.png
33.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/covenant/monitor.png
33.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/spawnas2.png
33.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path3/covenant/standin.png
32.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/empire/asktgt-cert.png
32.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/psexec-execution.png
32.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/sharefinder.png
32.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor3/covenant/spawn.png
32.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/winrm.PNG
32.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/psexecgrunt.png
32.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/windows-mount.png
32.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path3/empire/s4u.png
32.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/computer-admodule.png
32.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/powerviewuserenum.png
31.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/covenant/powershellgrunt.png
31.5 kB
2022/SEC565 Workbook/SEC565/workbook/img/SANS-Offensive-Operations-Logo.png
30.6 kB
2022/SEC565 Workbook/SEC565/workbook/resources/syntax/index.html
30.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/image03.png
30.5 kB
2022/SEC565 Workbook/SEC565/workbook/img/SANS-Offensive-Operations_Logo-Web-1.png
30.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor4/covenant/rubeus.png
30.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/image06.png
30.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path3/empire/invokepsexec.png
30.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/covenant/maketoken.png
30.0 kB
2022/SEC565 Workbook/SEC565/workbook/resources/about-labs/index.html
29.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/location.png
29.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/pivot1-diagram.png
29.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/pivot1-diagram.png
29.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/childhop/empire/dcsync.png
29.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/empire/dcsync.png
29.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor3/empire/krbtgt.png
29.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/sharphound.png
29.3 kB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/48/9616ae2cc8cef6b317b082271b78dc1c0260f2
29.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor4/covenant/whisker.png
29.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/covenant/spooler.png
29.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/image00.png
29.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/covenant/sacrificialsession.png
28.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/covenant/rubeus.png
28.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/bastion-diagram-1.png
28.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/bastion-diagram-1.png
28.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor3/covenant/standin.png
28.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/fgpwpol-adfind.png
28.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/listfiles.png
28.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/runas.png
27.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/reverse-socks.PNG
27.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/ghostcontainer.png
27.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/psexec.png
27.7 kB
2022/SEC565 Workbook/SEC565/workbook/index.html
27.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/netlocalgroupcmd.png
27.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adfind1.png
26.9 kB
2022/SEC565 Workbook/SEC565/workbook/resources/license/index.html
26.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/empire/location.png
26.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/socksserver.png
26.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/mmc.PNG
26.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/bloodhound-recruiting.PNG
26.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/covenant/sacrificial.png
26.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/workbook-update.png
26.1 kB
2022/SEC565 Workbook/SEC565/workbook/resources/virtual-machine-credentials/index.html
26.0 kB
2022/SEC565 Workbook/SEC565/workbook/resources/whats-in-media/index.html
25.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/childhop/covenant/sacrificial.png
25.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/sharphound-covenant-download.png
25.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/windows-mounted.png
25.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/redirection.png
25.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/fgpwpol-custom.png
25.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/covenant/monitor.png
25.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/getnetloggedonuser.png
24.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/processlist.png
24.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/windows-openvm.png
23.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/windows-mounted-plain.png
23.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adfind-computers.png
23.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/childhop/empire/trust.png
22.9 kB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/pack/pack-a5835f7443762e31a13a10fffe23d05818565349.idx
22.9 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/tinyseg.js
22.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/covenant/roastticket.png
22.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/windows-iso.png
22.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/covenant/processimpersonation.png
22.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/scmcallback.png
22.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image08.png
21.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/remotingtask.png
21.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adusersandcomputers.png
21.3 kB
2022/SEC565 Workbook/SEC565/workbook/404.html
21.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/LAPS-LAPSToolkit.png
21.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/LAPSToolKit.png
21.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adsi-passwordpolicy.png
21.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/systemgrunt.PNG
21.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/wmi.png
20.7 kB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/pack/pack-8738db4f374c1f90340e72cd7592dc8a00d61e7d.idx
20.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/domainpolicy-powerview.png
20.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/stagerscript.png
20.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/only-it-admodule.png
19.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/smbadexplorer.png
19.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adsi-users.png
18.9 kB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/84/75f97076f26f1850af73353b5d41113cacbec8
18.3 kB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/05/23dc52f56dd3ac1072e7b234d7831c903e448d
18.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/powershellremoting.png
18.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adfind2.png
18.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/image02.png
17.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/fgpwpol-admodule-highpriv.png
17.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/gmsa-powerview.png
17.3 kB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/2c/56dfcc4a6dd315447dae451f939e6c67b810b1
17.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor1/empire/setspn.png
17.1 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.ar.min.js
17.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/deny-all.png
17.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/socksserver.PNG
16.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/powershell.png
16.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/covenant/spool.png
16.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/advanced.png
16.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/httpserver.png
15.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/windows-extract-progress.png
15.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/powerviewtrust.png
15.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/wmic.png
15.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/pwpol-adfind.png
15.0 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.tr.min.js
15.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/gmsa-adfind.png
14.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/windows-extract-destination.png
14.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adfind-trust.png
14.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/psexec.png
14.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/domain-policy-admodule.png
13.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-agents.png
13.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/usersandcomputers.png
13.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/empire/ticket.png
13.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/image09.png
13.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/getnetlocalgroupmember-remote.png
13.5 kB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/e0/2aadd84c3e0afe4f00df88a585f06d37c70aa4
13.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/windows-extract-destination-plain.png
13.2 kB
2022/SEC565 Workbook/SEC565/workbook/css/jquery.fancybox.min.css
12.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/maketoken.png
12.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/fileshareaccess.png
12.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/hraccess.png
12.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-listeners.png
12.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-settings.png
12.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/ssh.png
12.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/psexec-callback.png
11.6 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.es.min.js
11.5 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/covenant/gruntcheckin.png
11.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-credentials.png
11.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/certreq.png
11.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/changedir.png
11.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/certutil.png
11.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-stagers.png
11.2 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.it.min.js
11.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-modules.png
11.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-upload.png
11.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-users.png
11.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-download.png
11.0 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.ro.min.js
11.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/admodule-users.png
10.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adexp-ldapsearch.png
10.7 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.fr.min.js
10.7 kB
2022/SEC565 Workbook/SEC565/workbook/assets/stylesheets/palette.e6a45f82.min.css
10.6 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/computeradsi.png
10.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/wmi-callback.png
10.4 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.ru.min.js
10.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-plugins.png
10.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/LAPS-ADFind.png
10.2 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.pt.min.js
10.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/covenant/taskkill.png
9.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/scmcallback.png
9.8 kB
2022/SEC565 Workbook/SEC565/workbook/img/favicon.ico
9.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-actions.png
9.6 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.hu.min.js
9.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-reporting.png
9.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/only-description-users.png
9.4 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.fi.min.js
9.3 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adsidomainadmin.png
9.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/ou-noprot.png
9.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adsi-passwordpolicy2.png
8.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adsi-trust.png
8.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/fgpwpol-adsi.png
8.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/userui.png
8.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path3/covenant/systemgrunt.png
7.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/gmsa-adsi.png
7.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/admodule-dns.png
7.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/callback-psremote.png
7.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/admodule-trust.png
7.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/wmi-grunt.png
7.1 kB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/ca/84ac1073aae359ac1e5b8f9325870b17e21f23
7.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/replicationrights.png
6.8 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.du.min.js
6.2 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/gmsa-admodule.png
6.1 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.de.min.js
6.1 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/LAPS-ADModule.png
6.1 kB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/pack/pack-90b4589ad74a56edf25af390111108b7a85dc922.idx
6.1 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.nl.min.js
6.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adexplorer.png
5.8 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/LAPS-adsi.png
5.7 kB
2022/SEC565 Workbook/SEC565/workbook/css/html.css
5.4 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/LAPS-Powerview.png
5.3 kB
2022/SEC565 Workbook/SEC565/workbook/img/sans-logo.png
5.1 kB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/pack/pack-1f71ccc745b2d328a7b9e0611be72e6f5869c7b5.idx
5.0 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/color-icon.png
4.9 kB
2022/SEC565 Workbook/SEC565/workbook/.git/hooks/pre-rebase.sample
4.9 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/search-icon.png
4.8 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.no.min.js
4.8 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.da.min.js
4.7 kB
2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/expand-icon.png
4.6 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.sv.min.js
4.5 kB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/pack/pack-03bdfb6e4174a4f0d659f690a6368cd0960936e3.idx
4.3 kB
2022/SEC565 Workbook/SEC565/workbook/.git/logs/HEAD
4.1 kB
2022/SEC565 Workbook/SEC565/workbook/sitemap.xml
3.7 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.stemmer.support.min.js
3.6 kB
2022/SEC565 Workbook/SEC565/workbook/.git/hooks/update.sample
3.6 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.hi.min.js
3.4 kB
2022/SEC565 Workbook/SEC565/workbook/.git/hooks/fsmonitor-watchman.sample
3.3 kB
2022/SEC565 Workbook/SEC565/workbook/assets/stylesheets/palette.e6a45f82.min.css.map
3.2 kB
2022/SEC565 Workbook/SEC565/workbook/resources/create_workbook-update_task.ps1
2.8 kB
2022/SEC565 Workbook/SEC565/workbook/resources/workbook-update.sh
2.3 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.ja.min.js
2.3 kB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/3d/8421e59a505bdf9ba985880eaf6d36aaddbb48
2.1 kB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/ea/fa574bada54914d166fb3acde997aacb0a2a64
2.1 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.zh.min.js
2.1 kB
2022/SEC565 Workbook/SEC565/workbook/img/magnify.png
2.0 kB
2022/SEC565 Workbook/SEC565/workbook/assets/images/favicon.png
1.9 kB
2022/SEC565 Workbook/SEC565/workbook/css/pdf.css
1.9 kB
2022/SEC565 Workbook/SEC565/workbook/.git/hooks/pre-commit.sample
1.6 kB
2022/SEC565 Workbook/SEC565/workbook/.git/hooks/prepare-commit-msg.sample
1.5 kB
2022/SEC565 Workbook/SEC565/workbook/.git/hooks/pre-push.sample
1.3 kB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/2f/8640a031993b3c67512637025321e2b16c3f48
1.1 kB
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.th.min.js
1.0 kB
2022/SEC565 Workbook/SEC565/workbook/.git/objects/53/de862cb943ba1549b3f74dc36915b30d433560
978 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/hooks/commit-msg.sample
896 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/b8/207d92d91c81e2146a51d0ade6e658419d02df
847 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/a3/fc67491d0c0773f5109e11f63e65342ce57223
846 Bytes
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.multi.min.js
817 Bytes
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.vi.min.js
784 Bytes
2022/SEC565 Workbook/SEC565/workbook/css/custom.css
708 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/logs/refs/remotes/origin/H02
655 Bytes
2022/SEC565 Workbook/SEC565/workbook/resources/ewb-update.cron
647 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/logs/refs/heads/H02
630 Bytes
2022/SEC565 Workbook/SEC565/workbook/js/workbook.js
588 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/hooks/pre-receive.sample
544 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/hooks/applypatch-msg.sample
478 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/a1/84b0ce3805d5ad6444ea18f238fb6584ab1f3c
432 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/hooks/pre-applypatch.sample
424 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/da/7d6e61c7d55d668daa9926a6711e1ec00025d4
408 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/e6/b940a862d66a6aa17f0307881cb2727fe826a6
408 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/4e/d2a7607a6682e5935607ca0ca91e0196c8316a
406 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/67/5fdf2b545027596a7b495ace99743303318d01
385 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/0d/edc770eea99e0b5b4669ee41d1a43a517e964f
384 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/9e/9e8ad53c5a50468f8aaf0f6b700669a096db00
383 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/88/c067a6e8d679991490eb03d3d81afc54ced430
383 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/ee/7fd17c297f539e8cc87c62218f16afd02fb1c9
383 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/61/1238327845b03cff69177e2f418eefe07e913d
382 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/b1/da70439c537b4231ac210462ae916498622105
382 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/26/37097d4f94c6abb01a2af700e9c86583f76303
362 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/logs/refs/heads/H01
361 Bytes
2022/SEC565 Workbook/SEC565/workbook/resources/ewb-update.service
353 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/5d/7bc8cb8beef81ca6a47375280d9475aa9a0042
342 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/00/6fd2eb57dbc0e5142ecae18e399a2d04f335fb
291 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/fd/cf45be784b759cc32e53416508c5a942a5f024
291 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/cc/a6c95daae6170e62d10b4ea1afb754c99ce3d2
252 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/02/fed966c84d52b949af3800ebf03aefae36fd27
241 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/info/exclude
240 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/02/d571a5646a1be47b05eacead6838733bcdc45c
235 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/3a/7ba5dc6429f2e9fa3845c637555bf9bd6bad1c
235 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/5f/15446dfcd9929f5cbd8d98233728c8360196b7
235 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/09/b520f06003a8e93757a5a7c9d2526d72b35de7
235 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/17/aaf30eb9fe9b7b491f410725398bb08c0f5835
235 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/27/1557900d2ee8d1528b6d801428f836e8ee89e1
235 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/62/739e4fee5aa66b5be23a5cea1ebc33129d247b
235 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/f3/a5ba4489c938d3d367d4b22fbdddfb92c3a98f
235 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/1f/27b47ff2ba38a5d11b90efe2a9c81f8e296c1d
233 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/84/c38044b8eca9d77261866e1f2139cd7e2f1ba0
232 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/24/d09afff17f71bb288796c414d8f13cabca4d9f
217 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/bd/53ba48ced073cd40e7b9d84d77c3d0b992629a
217 Bytes
2022/SEC565 Workbook/SEC565/workbook/sitemap.xml.gz
216 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/hooks/post-update.sample
189 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/aa/986bb76eac578ad8141d2cbbb87cab69f4a1e8
177 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/af/e8821fddcf33c87a74780fb0b25fbb3a292d98
177 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/logs/refs/remotes/origin/H01
168 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/f6/2c97053b67350781c91022e6c7502732af647d
159 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/98/1b7f78504388ecc59386d784aea66eaf0666ba
158 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/9d/af28ce076c9caefc698d358c1bf2e8d5c51cc7
157 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/14/aab081f4168b1b8ac88d54cab6fce1f917844e
140 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/21/dbd4683f80236d88c6b3fd93b74ce24b2b064c
139 Bytes
2022/SEC565 Workbook/SEC565/workbook/README.md
138 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/38/4ad0535449cd92d4be44bb661904691ecd9f97
138 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/da/0ef3a7397c5983946944fcf189e0c47a4d4680
138 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/c1/5cb6a204f95b4fbffb8f83933d1555049ad286
137 Bytes
2020/Sec450 Video/Section 1/desktop.ini
136 Bytes
2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/desktop.ini
136 Bytes
2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/desktop.ini
136 Bytes
2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/desktop.ini
136 Bytes
2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/desktop.ini
136 Bytes
2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/desktop.ini
136 Bytes
2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/desktop.ini
136 Bytes
2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/desktop.ini
136 Bytes
2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/desktop.ini
136 Bytes
2020/Sec450 Video/Section 1/1.9 DAY 1 SUMMARY/desktop.ini
136 Bytes
2020/Sec450 Video/Section 2/desktop.ini
136 Bytes
2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/desktop.ini
136 Bytes
2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/desktop.ini
136 Bytes
2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/desktop.ini
136 Bytes
2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/desktop.ini
136 Bytes
2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/desktop.ini
136 Bytes
2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/desktop.ini
136 Bytes
2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/desktop.ini
136 Bytes
2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/desktop.ini
136 Bytes
2020/Sec450 Video/Section 2/2.9 DAY 2 SUMMARY/desktop.ini
136 Bytes
2020/Sec450 Video/Section 3/desktop.ini
136 Bytes
2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/desktop.ini
136 Bytes
2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/desktop.ini
136 Bytes
2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/desktop.ini
136 Bytes
2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/desktop.ini
136 Bytes
2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/desktop.ini
136 Bytes
2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/desktop.ini
136 Bytes
2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/desktop.ini
136 Bytes
2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/desktop.ini
136 Bytes
2020/Sec450 Video/Section 3/3.9 DAY 3 SUMMARY/desktop.ini
136 Bytes
2020/Sec450 Video/Section 4/desktop.ini
136 Bytes
2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/desktop.ini
136 Bytes
2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/desktop.ini
136 Bytes
2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/desktop.ini
136 Bytes
2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/desktop.ini
136 Bytes
2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/desktop.ini
136 Bytes
2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/desktop.ini
136 Bytes
2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/desktop.ini
136 Bytes
2020/Sec450 Video/Section 5/desktop.ini
136 Bytes
2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/desktop.ini
136 Bytes
2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/desktop.ini
136 Bytes
2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/desktop.ini
136 Bytes
2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/desktop.ini
136 Bytes
2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/desktop.ini
136 Bytes
2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/desktop.ini
136 Bytes
2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/desktop.ini
136 Bytes
2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/desktop.ini
136 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/76/8d34dbd14477adffedc8bb65d837683a51cccf
124 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/7e/9241be456ba52126ed989fabe0e652c5880159
120 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/2d/998800e82714f9bf49a526dad58579005ce6f8
119 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/68/47174915d557c8625d476e01729b2c1d569fe6
119 Bytes
2022/SEC565 Workbook/SEC565/workbook/js/custom.js
102 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/2f/9135021c129ef110d51ddb8baf22ffcb37aaa1
81 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/3f/e5cbc0b2fb3a786225094600890dca934ec58e
81 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/7c/0638d285788a4719c5e51142e0e4de56b526f1
81 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/24/ad4f7777bd15fc57ef2baea5f0342ca66d1d4b
81 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/f4/4234e84a5e2b1e16ad42692240feecce88b2c9
81 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/4e/d14d631c5f245bba1a0089218b696edf85b181
62 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/8a/7f3976f26e9940fe7e84e5365b1a5b9d5553ca
62 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/c0/d978c3a5b6037cf3bfc471d7904da4811559bd
62 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/2c/7163b45ffd47628c2daa1726b1ae2877193e38
55 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/3e/772c297763593ef17d6d7712a4dec35a6b1b95
55 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/29/25ff65c0d7357e82cd854a97212950c96ea5d5
55 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/43/f529331ee38bf30f496dbfebd10ac244ff41d6
55 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/a9/ec9118fe728cab54b83fcf4738ce1448c9d479
55 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/objects/cc/e1f6306299917e72b85ecd9cb24f676613fdb3
54 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/refs/heads/H01
41 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/refs/heads/H02
41 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/refs/remotes/origin/H01
41 Bytes
2022/SEC565 Workbook/SEC565/workbook/.git/refs/remotes/origin/H02
41 Bytes
2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.jp.min.js
36 Bytes
2020/Sec450 PDF/PDF Password.txt
21 Bytes
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!