VoD 2021/5. Modern and Future Monitoring Forensics Analytics and Machine Learning/2. Modern and Future Monitoring/43. Learning vs Understanding.mp4 599.2 MB
VoD 2021/Zeek-2021/Zeek-2021/SEC503- SANS OnDemand_68.webm 538.5 MB
VoD 2021/5. Modern and Future Monitoring Forensics Analytics and Machine Learning/2. Modern and Future Monitoring/63. Summary.mp4 327.1 MB
VoD 2021/1. Fundamentals of Traffic Analysis Part I/3. Concepts of TCPIP/30. Concepts of TCPIP Exercises.mp4 293.6 MB
VoD 2021/5. Modern and Future Monitoring Forensics Analytics and Machine Learning/2. Modern and Future Monitoring/42. Vectorization.mp4 284.2 MB
VoD 2021/1. Fundamentals of Traffic Analysis Part I/7. Day 1 Bootcamp/22. Evening 1 Bootcamp Exercises.mp4 264.4 MB
VoD 2021/1. Fundamentals of Traffic Analysis Part I/1. Introduction to Fundamentals of Traffic Analysis Part I/1. Fundamentals of Traffic Analysis Part I.mp4 205.5 MB
VoD 2021/4. Anomalies and Behaviors/1. Architecture/1. Anomalies and Behaviors.mp4 202.4 MB
VoD 2021/1. Fundamentals of Traffic Analysis Part I/7. Day 1 Bootcamp/1. Course Roadmap 1.mp4 154.9 MB
VoD 2021/Zeek-2021/Zeek-2021/SEC503- SANS OnDemand_61.webm 153.6 MB
VoD 2021/5. Modern and Future Monitoring Forensics Analytics and Machine Learning/1. Practical NetFlow Applications/1. SEC5035.mp4 132.0 MB
VoD 2021/1. Fundamentals of Traffic Analysis Part I/5. The Network AccessLink Layer/20. The Network AccessLink Layer Review.mp4 123.4 MB
18. Modern HTTP/1. Understanding HTTP on the Network - SEC503 Network Monitoring and Threat Detection In-Depth CBT Nuggets-1.mp4 495.7 MB
15. Introduction to Suricata/4. Setting up Suricata - SEC503 Network Monitoring and Threat Detection In-Depth CBT Nuggets-1.mp4 493.0 MB
6. Real-World Application Researching a Network/2. Knowing the Packet - SEC503 Network Monitoring and Threat Detection In-Depth CBT Nuggets-1.mp4 492.5 MB
6. Real-World Application Researching a Network/5. Encryption Issues - SEC503 Network Monitoring and Threat Detection In-Depth CBT Nuggets-1.mp4 489.3 MB
13. Layer 4 and Beyond/2. Pen to Paper - SEC503 Network Monitoring and Threat Detection In-Depth CBT Nuggets-1.mp4 476.8 MB
2. Introduction to Wireshark/5. Exporting Things From Wireshark - SEC503 Network Monitoring and Threat Detection In-Depth CBT Nuggets-1.mp4 473.1 MB
20. How to Research a Protocol/5. What is this Protocol Used for - SEC503 Network Monitoring and Threat Detection In-Depth CBT Nuggets-1.mp4 471.7 MB
28. Threat Hunting and Visualization/4. Replaying the Traffic - SEC503 Network Monitoring and Threat Detection In-Depth CBT Nuggets-1.mp4 468.8 MB
22. Introduction to Snort/4. Setting up Snort - SEC503 Network Monitoring and Threat Detection In-Depth CBT Nuggets-1.mp4 463.8 MB
23. Burpsuite/4. Crawling Around - SEC503 Network Monitoring and Threat Detection In-Depth CBT Nuggets-1.mp4 455.6 MB
20. How to Research a Protocol/4. Tying in the Results to our Packets - SEC503 Network Monitoring and Threat Detection In-Depth CBT Nuggets-1.mp4 453.3 MB
15. Introduction to Suricata/5. Rule Configuration - SEC503 Network Monitoring and Threat Detection In-Depth CBT Nuggets-1.mp4 452.3 MB