18. Modern HTTP/1. Understanding HTTP on the Network - SEC503 Network Monitoring and Threat Detection In-Depth CBT Nuggets-1.mp4 495.7 MB
15. Introduction to Suricata/4. Setting up Suricata - SEC503 Network Monitoring and Threat Detection In-Depth CBT Nuggets-1.mp4 493.0 MB
6. Real-World Application Researching a Network/2. Knowing the Packet - SEC503 Network Monitoring and Threat Detection In-Depth CBT Nuggets-1.mp4 492.5 MB
6. Real-World Application Researching a Network/5. Encryption Issues - SEC503 Network Monitoring and Threat Detection In-Depth CBT Nuggets-1.mp4 489.3 MB
13. Layer 4 and Beyond/2. Pen to Paper - SEC503 Network Monitoring and Threat Detection In-Depth CBT Nuggets-1.mp4 476.8 MB
2. Introduction to Wireshark/5. Exporting Things From Wireshark - SEC503 Network Monitoring and Threat Detection In-Depth CBT Nuggets-1.mp4 473.1 MB
20. How to Research a Protocol/5. What is this Protocol Used for - SEC503 Network Monitoring and Threat Detection In-Depth CBT Nuggets-1.mp4 471.7 MB
28. Threat Hunting and Visualization/4. Replaying the Traffic - SEC503 Network Monitoring and Threat Detection In-Depth CBT Nuggets-1.mp4 468.8 MB
22. Introduction to Snort/4. Setting up Snort - SEC503 Network Monitoring and Threat Detection In-Depth CBT Nuggets-1.mp4 463.8 MB
23. Burpsuite/4. Crawling Around - SEC503 Network Monitoring and Threat Detection In-Depth CBT Nuggets-1.mp4 455.6 MB
20. How to Research a Protocol/4. Tying in the Results to our Packets - SEC503 Network Monitoring and Threat Detection In-Depth CBT Nuggets-1.mp4 453.3 MB
15. Introduction to Suricata/5. Rule Configuration - SEC503 Network Monitoring and Threat Detection In-Depth CBT Nuggets-1.mp4 452.3 MB