FileMood

Download Coursera - Microsoft Cybersecurity Analyst Professional Certificate 2024

Coursera Microsoft Cybersecurity Analyst Professional Certificate 2024

Name

Coursera - Microsoft Cybersecurity Analyst Professional Certificate 2024

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

6.5 GB

Total Files

1807

Last Seen

2025-03-28 00:01

Hash

A1BB0A1AC40A2BF2053917835EEF75B8C6BE19B2

/.../03_mitigation-strategies/

06_network-security.mp4

78.1 MB

01_identity-mitigation-strategy.en.srt

6.7 KB

01_identity-mitigation-strategy.en.txt

4.3 KB

01_identity-mitigation-strategy.mp4

14.0 MB

02_azure-security-mitigation-strategies.en.srt

12.1 KB

02_azure-security-mitigation-strategies.en.txt

6.3 KB

02_azure-security-mitigation-strategies.mp4

18.6 MB

03_implementing-network-security-on-azure.en.srt

9.3 KB

03_implementing-network-security-on-azure.en.txt

6.0 KB

03_implementing-network-security-on-azure.mp4

18.6 MB

04_securing-data-on-azure.en.srt

8.5 KB

04_securing-data-on-azure.en.txt

5.4 KB

04_securing-data-on-azure.mp4

17.6 MB

05_monitoring-azure-security_instructions.html

14.2 KB

06_network-security.en.srt

6.7 KB

06_network-security.en.txt

3.5 KB

07_knowledge-check-mitigation-strategies_quiz.html

5.1 KB

08_module-summary-security-conscious-modeling.en.srt

9.9 KB

08_module-summary-security-conscious-modeling.en.txt

6.4 KB

08_module-summary-security-conscious-modeling.mp4

20.2 MB

09_additional-resources-security-conscious-modeling_instructions.html

5.0 KB

/.../01_course-introduction/

01_introduction-to-the-course.en.srt

5.1 KB

01_introduction-to-the-course.en.txt

3.2 KB

01_introduction-to-the-course.mp4

11.6 MB

02_course-syllabus_instructions.html

7.3 KB

03_how-to-be-successful-in-this-course_instructions.html

6.6 KB

04_microsoft-azure-active-directory-name-change_instructions.html

3.4 KB

05_clean-up-resources_instructions.html

3.2 KB

06_how-to-open-an-image-in-a-new-tab_instructions.html

75.7 KB

07_additional-resources_instructions.html

2.8 KB

/.../02_introduction-to-threat-modeling/

01_threat-modeling-process.en.srt

9.2 KB

01_threat-modeling-process.en.txt

5.9 KB

01_threat-modeling-process.mp4

19.3 MB

02_decompose-the-application.en.srt

11.0 KB

02_decompose-the-application.en.txt

5.8 KB

02_decompose-the-application.mp4

20.5 MB

03_determine-and-rank-threats.en.srt

8.4 KB

03_determine-and-rank-threats.en.txt

5.3 KB

03_determine-and-rank-threats.mp4

21.5 MB

04_stride-threat-list.en.srt

9.8 KB

04_stride-threat-list.en.txt

5.1 KB

04_stride-threat-list.mp4

17.0 MB

05_determine-countermeasures-and-mitigation_instructions.html

14.1 KB

06_threat-modeling_instructions.html

129.2 KB

07_exercise-create-a-threat-model-for-a-simple-web-application_instructions.html

4.4 KB

08_self-review-create-a-threat-model-for-a-simple-web-application_quiz.html

4.4 KB

09_clean-up-resources_instructions.html

3.2 KB

10_knowledge-check-introduction-to-threat-modeling_quiz.html

5.0 KB

11_additional-resources-introduction-to-threat-modeling_instructions.html

4.2 KB

11_additional-resources-introduction-to-threat-modeling_Threat_Modeling_Cheat_Sheet.html

61.7 KB

/.../03_threat-modeling-strategies/

01_benefits-of-threat-modeling.en.srt

11.1 KB

01_benefits-of-threat-modeling.en.txt

6.0 KB

01_benefits-of-threat-modeling.mp4

21.5 MB

02_ensure-application-security-sans-approach.en.srt

10.5 KB

02_ensure-application-security-sans-approach.en.txt

5.6 KB

02_ensure-application-security-sans-approach.mp4

21.8 MB

03_cyberthreat-modeling_instructions.html

225.7 KB

04_process-for-attack-simulation-and-threat-analysis-pasta.en.srt

11.6 KB

04_process-for-attack-simulation-and-threat-analysis-pasta.en.txt

6.2 KB

04_process-for-attack-simulation-and-threat-analysis-pasta.mp4

23.2 MB

05_pasta-in-depth_instructions.html

217.4 KB

06_common-vulnerability-scoring-system-cvss.en.srt

9.4 KB

06_common-vulnerability-scoring-system-cvss.en.txt

6.0 KB

06_common-vulnerability-scoring-system-cvss.mp4

22.3 MB

07_cvss-cheat-sheet_instructions.html

2.9 MB

08_visual-agile-and-simple-threat-vast.en.srt

9.5 KB

08_visual-agile-and-simple-threat-vast.en.txt

6.1 KB

08_visual-agile-and-simple-threat-vast.mp4

26.3 MB

09_enterprise-security-methodologies_instructions.html

11.9 KB

10_exercise-evaluating-threats_instructions.html

8.9 KB

11_self-review-evaluating-threats_quiz.html

4.6 KB

12_knowledge-check-threat-modeling-strategies_quiz.html

4.7 KB

13_additional-resources-threat-modeling-strategies_instructions.html

3.4 KB

/.../04_azure-and-threat-modeling/

01_microsoft-threat-modeling-tool.en.srt

10.6 KB

01_microsoft-threat-modeling-tool.en.txt

6.5 KB

01_microsoft-threat-modeling-tool.mp4

22.2 MB

02_threat-modeling-for-azure-virtual-networks.en.srt

12.5 KB

02_threat-modeling-for-azure-virtual-networks.en.txt

6.6 KB

02_threat-modeling-for-azure-virtual-networks.mp4

22.3 MB

03_four-question-framework-for-effective-threat-modeling.en.srt

8.8 KB

03_four-question-framework-for-effective-threat-modeling.en.txt

4.7 KB

03_four-question-framework-for-effective-threat-modeling.mp4

16.0 MB

04_activity-building-a-model_instructions.html

2.8 MB

04_activity-building-a-model_Sample_Threat_Model_https.tm7

408.4 KB

04_activity-building-a-model_Sample_Threat_Model_https_Report.htm

112.8 KB

04_activity-building-a-model_Sample_Threat_Model_https_Report.pdf

1.8 MB

04_activity-building-a-model_Threatlist-activity.csv

3.4 KB

05_security-development-lifecycle-sdl_instructions.html

443.4 KB

06_exercise-web-application-threat-modeling_instructions.html

138.7 KB

07_self-review-web-application-threat-modeling_quiz.html

4.8 KB

08_module-summary-threat-modeling.en.srt

11.9 KB

08_module-summary-threat-modeling.en.txt

6.2 KB

08_module-summary-threat-modeling.mp4

19.6 MB

09_additional-resources-threat-modeling_instructions.html

3.1 KB

/.../01_susceptible-infrastructure-and-types-of-attack/

01_understanding-susceptible-infrastructure.en.srt

9.1 KB

01_understanding-susceptible-infrastructure.en.txt

5.9 KB

01_understanding-susceptible-infrastructure.mp4

15.4 MB

02_understanding-susceptible-infrastructure-in-depth_instructions.html

10.6 KB

03_activity-risk-assessment_instructions.html

19.3 KB

04_mitre-att-ck-matrix-overview.en.srt

10.1 KB

04_mitre-att-ck-matrix-overview.en.txt

5.4 KB

04_mitre-att-ck-matrix-overview.mp4

18.3 MB

05_mitre-att-ck-matrix-key-points.en.srt

10.9 KB

05_mitre-att-ck-matrix-key-points.en.txt

5.8 KB

05_mitre-att-ck-matrix-key-points.mp4

15.0 MB

06_attack-techniques.en.srt

4.8 KB

06_attack-techniques.en.txt

3.1 KB

06_attack-techniques.mp4

30.0 MB

07_types-of-malicious-software.en.srt

9.0 KB

07_types-of-malicious-software.en.txt

4.8 KB

07_types-of-malicious-software.mp4

11.5 MB

08_prevention-detection-and-countermeasures.en.srt

6.5 KB

08_prevention-detection-and-countermeasures.en.txt

3.4 KB

08_prevention-detection-and-countermeasures.mp4

11.2 MB

09_mitigation_instructions.html

9.1 KB

10_knowledge-check-susceptible-infrastructure_quiz.html

5.7 KB

11_additional-resources-susceptible-infrastructure_instructions.html

5.1 KB

/.../02_iot-internet-of-things-and-common-attacks/

01_what-is-an-iot-device.en.srt

8.4 KB

01_what-is-an-iot-device.en.txt

5.3 KB

01_what-is-an-iot-device.mp4

15.7 MB

02_iot-attacks.en.srt

7.9 KB

02_iot-attacks.en.txt

4.2 KB

02_iot-attacks.mp4

15.8 MB

03_iot-attack-risk.en.srt

5.9 KB

03_iot-attack-risk.en.txt

3.7 KB

03_iot-attack-risk.mp4

11.0 MB

04_iot-attack-prevention-strategies.en.srt

8.2 KB

04_iot-attack-prevention-strategies.en.txt

5.4 KB

04_iot-attack-prevention-strategies.mp4

18.5 MB

05_azure-iot.en.srt

8.5 KB

05_azure-iot.en.txt

5.4 KB

05_azure-iot.mp4

19.6 MB

06_defender-for-iot.en.srt

7.9 KB

06_defender-for-iot.en.txt

4.9 KB

06_defender-for-iot.mp4

15.4 MB

07_defender-for-iot-deployment-and-integration.en.srt

7.5 KB

07_defender-for-iot-deployment-and-integration.en.txt

4.7 KB

07_defender-for-iot-deployment-and-integration.mp4

15.6 MB

08_a-guide-to-iot-device-architecture_instructions.html

489.0 KB

09_exercise-iot-device-analysis_instructions.html

5.2 KB

10_self-review-iot-device-analysis_quiz.html

3.2 KB

11_exemplar-iot-device-analysis_instructions.html

9.9 KB

12_knowledge-check-iot-internet-of-things-and-common-attacks_quiz.html

5.8 KB

13_module-summary-advanced-threats-and-mitigation.en.srt

12.4 KB

13_module-summary-advanced-threats-and-mitigation.en.txt

6.4 KB

13_module-summary-advanced-threats-and-mitigation.mp4

20.6 MB

14_additional-resources-iot-internet-of-things-and-common-attacks_instructions.html

4.2 KB

/.../01_entry-points-and-associated-risks/

01_threat-landscape-and-vectors.en.srt

9.2 KB

01_threat-landscape-and-vectors.en.txt

5.8 KB

01_threat-landscape-and-vectors.mp4

21.4 MB

02_access-brokers.en.srt

8.3 KB

02_access-brokers.en.txt

5.2 KB

02_access-brokers.mp4

16.1 MB

03_mitigation-approaches.en.srt

12.3 KB

03_mitigation-approaches.en.txt

6.5 KB

03_mitigation-approaches.mp4

21.7 MB

04_antivirus-and-anti-malware_instructions.html

10.8 KB

05_advanced-antivirus-and-antimalware-techniques_instructions.html

8.8 KB

06_knowledge-check-entry-points_quiz.html

4.0 KB

07_additional-resources-entry-points_instructions.html

2.7 KB

/.../02_secure-network-design-with-defense-in-depth/

01_defense-in-depth-did.en.srt

9.5 KB

01_defense-in-depth-did.en.txt

5.1 KB

01_defense-in-depth-did.mp4

15.2 MB

02_defense-in-depth-strategy_instructions.html

650.8 KB

03_defending-your-cloud-infrastructure.en.srt

8.6 KB

03_defending-your-cloud-infrastructure.en.txt

5.4 KB

03_defending-your-cloud-infrastructure.mp4

16.6 MB

04_azure-security-building-a-network-with-did.en.srt

10.6 KB

04_azure-security-building-a-network-with-did.en.txt

5.7 KB

04_azure-security-building-a-network-with-did.mp4

18.2 MB

05_identity-infrastructure_instructions.html

70.3 KB

06_modern-authentication.en.srt

8.4 KB

06_modern-authentication.en.txt

5.4 KB

06_modern-authentication.mp4

20.0 MB

07_focused-defense_instructions.html

463.8 KB

08_knowledge-check-secure-network-design-with-defense-in-depth_quiz.html

4.7 KB

09_additional-resources-secure-network-design-with-defense-in-depth_instructions.html

3.3 KB

/Coursera - Advanced Cybersecurity Concepts and Capstone Project 2024-1/

Readme.txt

0.1 KB

/.../01_capstone-project/

01_course-recap-advanced-cybersecurity-concepts.en.srt

10.1 KB

01_course-recap-advanced-cybersecurity-concepts.en.txt

6.5 KB

01_course-recap-advanced-cybersecurity-concepts.mp4

23.0 MB

02_recap-microsoft-cybersecurity-analyst-course-projects_instructions.html

10.6 KB

03_capstone-introduction.en.srt

5.6 KB

03_capstone-introduction.en.txt

3.6 KB

03_capstone-introduction.mp4

10.3 MB

04_capstone-check-in_instructions.html

667.1 KB

04_capstone-check-in_Notes_for_a_cybersecurity_proposal.docx

18.1 KB

04_capstone-check-in_VIP_Event_employee_list.docx

17.9 KB

05_stage-one-company-requirements_instructions.html

203.3 KB

06_stage-two-aad-set-up_instructions.html

193.8 KB

07_stage-three-roles-and-access_instructions.html

200.4 KB

08_stage-four-aad-connections_instructions.html

201.2 KB

09_stage-five-policy-implementation_instructions.html

199.5 KB

10_clean-up-resources_instructions.html

3.2 KB

/.../02_wrap-up-advanced-cybersecurity-concepts-and-capstone/

01_congratulations.en.srt

6.8 KB

01_congratulations.en.txt

3.6 KB

01_congratulations.mp4

11.4 MB

02_next-steps_instructions.html

6.2 KB

/Coursera - Cybersecurity Identity and Access Solutions using Azure AD 2024-1/

links.txt

0.1 KB

Readme.txt

0.1 KB

/.../01_course-introduction/

01_introduction-to-the-course.en.srt

7.0 KB

01_introduction-to-the-course.en.txt

4.5 KB

01_introduction-to-the-course.mp4

14.8 MB

02_course-syllabus_instructions.html

8.7 KB

03_how-to-be-successful-in-this-course_instructions.html

6.6 KB

04_setting-up-your-free-azure-account_instructions.html

9.8 KB

05_microsoft-azure-active-directory-name-change_instructions.html

3.4 KB

06_clean-up-resources_instructions.html

3.2 KB

07_working-with-azure-portal_instructions.html

1.8 MB

08_how-to-open-an-image-in-a-new-tab_instructions.html

75.7 KB

09_additional-resources-identity-services_instructions.html

4.3 KB

/.../02_azure-active-directory/

01_introduction-to-aad.en.srt

8.0 KB

01_introduction-to-aad.en.txt

5.1 KB

01_introduction-to-aad.mp4

15.9 MB

02_migration.en.srt

8.1 KB

02_migration.en.txt

4.3 KB

02_migration.mp4

15.6 MB

03_implementing-azure-ad-in-your-organization.en.srt

10.6 KB

03_implementing-azure-ad-in-your-organization.en.txt

5.7 KB

03_implementing-azure-ad-in-your-organization.mp4

18.3 MB

04_features-of-azure-ad_instructions.html

571.1 KB

05_managing-users-and-groups-in-azure-ad_instructions.html

1.7 MB

06_lets-talk-about-azure-active-directory.en.srt

5.4 KB

06_lets-talk-about-azure-active-directory.en.txt

2.9 KB

06_lets-talk-about-azure-active-directory.mp4

20.1 MB

07_exercise-azure-active-directory_instructions.html

5.0 KB

08_self-review-azure-active-directory_quiz.html

2.6 KB

09_clean-up-resources_instructions.html

3.2 KB

10_knowledge-check-azure-active-directory_quiz.html

4.3 KB

11_additional-resources-azure-active-directory_instructions.html

3.9 KB

/.../03_azure-active-directory-and-editions/

01_comparing-azure-ad-editions.en.srt

8.3 KB

01_comparing-azure-ad-editions.en.txt

5.3 KB

01_comparing-azure-ad-editions.mp4

13.7 MB

02_azure-ad-pricing-model_instructions.html

432.8 KB

03_choosing-the-right-azure-ad-edition-for-your-organization.en.srt

9.5 KB

03_choosing-the-right-azure-ad-edition-for-your-organization.en.txt

5.1 KB

03_choosing-the-right-azure-ad-edition-for-your-organization.mp4

15.8 MB

04_upgrading-to-a-higher-azure-ad-edition_instructions.html

201.2 KB

05_knowledge-check-azure-active-directory-and-editions_quiz.html

4.6 KB

06_additional-resources-azure-active-directory-and-editions_instructions.html

4.5 KB

/.../04_azure-active-directory-identity-types/

01_overview-of-azure-ad-identity-types.en.srt

9.4 KB

01_overview-of-azure-ad-identity-types.en.txt

5.9 KB

01_overview-of-azure-ad-identity-types.mp4

18.2 MB

02_azure-ad-b2b-and-b2c.en.srt

9.0 KB

02_azure-ad-b2b-and-b2c.en.txt

5.7 KB

02_azure-ad-b2b-and-b2c.mp4

19.8 MB

03_identity-scope_C4M1L4_Item_03-_Identity_scopeV2.mp4

6.6 MB

03_identity-scope_instructions.html

223.7 KB

04_activity-create-an-azure-ad-identity_instructions.html

92.0 KB

05_using-azure-ad-with-other-identity-providers_instructions.html

583.0 KB

06_knowledge-check-azure-active-directory-identity-types_quiz.html

4.5 KB

07_module-summary-identity-services.en.srt

7.2 KB

07_module-summary-identity-services.en.txt

4.6 KB

07_module-summary-identity-services.mp4

17.8 MB

08_additional-resources-azure-active-directory-identity-types_instructions.html

8.9 KB

/.../01_authentication-methods/

01_aad-authentication-introduction.en.srt

10.3 KB

01_aad-authentication-introduction.en.txt

5.5 KB

01_aad-authentication-introduction.mp4

15.1 MB

02_introduction-to-hybrid-identities.en.srt

8.7 KB

02_introduction-to-hybrid-identities.en.txt

5.6 KB

02_introduction-to-hybrid-identities.mp4

18.2 MB

03_expand-on-azure-ad-authentication-methods_instructions.html

7.6 KB

04_variations-on-authentication.en.srt

9.7 KB

04_variations-on-authentication.en.txt

5.2 KB

04_variations-on-authentication.mp4

16.8 MB

05_authentication-methods_instructions.html

10.0 KB

06_introduction-to-vaults.en.srt

9.9 KB

06_introduction-to-vaults.en.txt

5.2 KB

06_introduction-to-vaults.mp4

15.3 MB

07_password-information_instructions.html

6.9 KB

08_activity-check-out-how-brute-force-attacks-work_instructions.html

8.4 KB

09_set-up-a-sso-in-the-free-azure-portal.en.srt

10.9 KB

09_set-up-a-sso-in-the-free-azure-portal.en.txt

5.8 KB

09_set-up-a-sso-in-the-free-azure-portal.mp4

16.0 MB

10_exercise-set-up-a-sso-in-the-free-azure-portal_instructions.html

31.4 KB

11_additional-resources-active-directory-authentication_instructions.html

4.8 KB

/.../02_multi-factor-authentication/

01_introduction-to-mfa.en.srt

10.7 KB

01_introduction-to-mfa.en.txt

5.7 KB

01_introduction-to-mfa.mp4

18.5 MB

02_managing-multi-factor-authentication-in-azure-active-directory.en.srt

9.3 KB

02_managing-multi-factor-authentication-in-azure-active-directory.en.txt

5.9 KB

02_managing-multi-factor-authentication-in-azure-active-directory.mp4

19.0 MB

03_recovery-for-the-mfa.en.srt

9.8 KB

03_recovery-for-the-mfa.en.txt

5.3 KB

03_recovery-for-the-mfa.mp4

14.0 MB

04_tracking-triggers_instructions.html

170.7 KB

05_additional-resources_instructions.html

3.9 KB

/.../03_password-protection-and-resetting/

01_introducing-self-service-password-reset.en.srt

10.2 KB

01_introducing-self-service-password-reset.en.txt

5.4 KB

01_introducing-self-service-password-reset.mp4

17.3 MB

02_enabling-and-configuring-self-service-password-reset.en.srt

7.9 KB

02_enabling-and-configuring-self-service-password-reset.en.txt

5.0 KB

02_enabling-and-configuring-self-service-password-reset.mp4

13.1 MB

03_password-validation.en.srt

9.6 KB

03_password-validation.en.txt

5.1 KB

03_password-validation.mp4

15.1 MB

04_exercise-implementing-sspr_instructions.html

6.7 KB

05_module-summary-active-directory-authentication.en.srt

9.9 KB

05_module-summary-active-directory-authentication.en.txt

5.2 KB

05_module-summary-active-directory-authentication.mp4

15.2 MB

06_additional-resources-multi-factor-authentication_instructions.html

4.5 KB

/.../01_conditional-access/

01_conditional-access-policies.en.srt

11.4 KB

01_conditional-access-policies.en.txt

6.0 KB

01_conditional-access-policies.mp4

17.1 MB

02_how-to-create-a-conditional-policy_instructions.html

2.1 MB

03_using-conditional-access-in-azure-ad.en.srt

14.1 KB

03_using-conditional-access-in-azure-ad.en.txt

7.5 KB

03_using-conditional-access-in-azure-ad.mp4

21.2 MB

04_conditional-access-in-azure-ad_instructions.html

9.4 KB

05_exercise-conditional-policy_instructions.html

206.3 KB

06_additional-resources-conditional-access_instructions.html

5.7 KB

/.../02_roles-and-role-based-access/

01_role-based-access.en.srt

10.6 KB

01_role-based-access.en.txt

5.7 KB

01_role-based-access.mp4

17.4 MB

02_configuring-roles-and-role-based-access_instructions.html

2.9 MB

03_roles_instructions.html

2.4 MB

04_roles-in-action.en.srt

7.3 KB

04_roles-in-action.en.txt

3.9 KB

04_roles-in-action.mp4

38.0 MB

05_creating-custom-roles_instructions.html

3.6 MB

06_additional-resources-roles-and-role-based-access_instructions.html

5.8 KB

/.../03_identity-governance/

01_introduction-to-identity-governance.en.srt

10.0 KB

01_introduction-to-identity-governance.en.txt

5.3 KB

01_introduction-to-identity-governance.mp4

17.7 MB

02_aad-security-and-zero-policy_instructions.html

874.3 KB

03_designing-identity-governance.en.srt

12.6 KB

03_designing-identity-governance.en.txt

6.6 KB

03_designing-identity-governance.mp4

17.7 MB

04_security-principals_instructions.html

455.7 KB

05_managing-identities.en.srt

9.6 KB

05_managing-identities.en.txt

5.1 KB

05_managing-identities.mp4

17.0 MB

06_best-practices-for-identity-governance_instructions.html

1.7 MB

07_additional-resources-identity-governance_instructions.html

5.8 KB

/.../04_privileged-identity-management-and-protection/

01_just-in-time-and-just-enough-access.en.srt

8.7 KB

01_just-in-time-and-just-enough-access.en.txt

5.6 KB

01_just-in-time-and-just-enough-access.mp4

16.1 MB

02_privileged-identity-management-pim.en.srt

9.6 KB

02_privileged-identity-management-pim.en.txt

5.1 KB

02_privileged-identity-management-pim.mp4

16.2 MB

03_securing-privileged-access-with-azure-ad-pim_instructions.html

3.3 MB

04_additional-resources-privileged-identity-management-and-protection_instructions.html

8.3 KB

05_module-summary-active-directory-access-protection-and-governance-management.en.srt

8.8 KB

05_module-summary-active-directory-access-protection-and-governance-management.en.txt

5.6 KB

05_module-summary-active-directory-access-protection-and-governance-management.mp4

17.9 MB

/.../01_final-course-project-and-assessment/

01_course-recap-identity-and-access-solutions.en.srt

9.8 KB

01_course-recap-identity-and-access-solutions.en.txt

6.2 KB

01_course-recap-identity-and-access-solutions.mp4

15.9 MB

02_about-the-final-project-and-assessment_instructions.html

13.8 KB

03_exercise-configure-identity-and-access-policies_instructions.html

8.6 KB

04_clean-up-resources_instructions.html

3.2 KB

/.../02_course-wrap-up/

01_congratulations.en.srt

5.0 KB

01_congratulations.en.txt

3.2 KB

01_congratulations.mp4

10.1 MB

02_next-steps_instructions.html

5.8 KB

/Coursera - Cybersecurity Management and Compliance 2024-1/

Readme.txt

0.1 KB

/.../01_course-introduction/

01_introduction-to-the-course.en.srt

6.6 KB

01_introduction-to-the-course.en.txt

4.2 KB

01_introduction-to-the-course.mp4

9.5 MB

02_course-syllabus_instructions.html

9.6 KB

03_how-to-be-successful-in-this-course_instructions.html

6.6 KB

04_microsoft-azure-active-directory-name-change_instructions.html

3.4 KB

05_clean-up-resources_instructions.html

3.2 KB

06_how-to-open-an-image-in-a-new-tab_instructions.html

75.7 KB

07_additional-resources_instructions.html

4.5 KB

/.../02_cloud-security-planning/

01_identity-disaster-recovery-and-training.en.srt

11.1 KB

01_identity-disaster-recovery-and-training.en.txt

5.9 KB

01_identity-disaster-recovery-and-training.mp4

15.0 MB

02_identity-disaster-recovery-and-training-in-depth_instructions.html

1.0 MB

03_data-network-and-physical-security.en.srt

12.5 KB

03_data-network-and-physical-security.en.txt

6.7 KB

03_data-network-and-physical-security.mp4

17.4 MB

04_enterprise-application-integration.en.srt

10.2 KB

04_enterprise-application-integration.en.txt

5.5 KB

04_enterprise-application-integration.mp4

15.6 MB

05_log-collection-analysis-and-retention.en.srt

11.0 KB

05_log-collection-analysis-and-retention.en.txt

5.9 KB

05_log-collection-analysis-and-retention.mp4

15.1 MB

06_security-planning-with-azure-monitor-logs_az.operationalinsights

59.0 KB

06_security-planning-with-azure-monitor-logs_instructions.html

1.2 MB

06_security-planning-with-azure-monitor-logs_Monitor.ingestion-readme

62.5 KB

06_security-planning-with-azure-monitor-logs_Monitor.query-readme

74.8 KB

07_security-planning-retention-and-archiving_instructions.html

144.1 KB

08_azure-security-services.en.srt

10.4 KB

08_azure-security-services.en.txt

5.5 KB

08_azure-security-services.mp4

14.1 MB

09_activity-application-integration_instructions.html

6.6 KB

10_knowledge-check-cloud-security-planning_quiz.html

6.6 KB

11_additional-resources-cloud-security-planning_instructions.html

10.0 KB

/.../03_cloud-adoption-framework/

01_azure-cloud-adoption-framework-caf.en.srt

13.5 KB

01_azure-cloud-adoption-framework-caf.en.txt

7.1 KB

01_azure-cloud-adoption-framework-caf.mp4

18.6 MB

02_caf-planning-stage-one_instructions.html

12.6 KB

03_caf-planning-stage-two_instructions.html

109.6 KB

04_the-5-points-of-security.en.srt

12.6 KB

04_the-5-points-of-security.en.txt

6.7 KB

04_the-5-points-of-security.mp4

17.4 MB

05_exercise-design-a-security-plan_instructions.html

24.3 KB

06_self-review-design-a-security-plan_quiz.html

3.9 KB

07_clean-up-resources_instructions.html

3.2 KB

08_knowledge-check-cloud-adoption-framework_quiz.html

5.4 KB

09_additional-resources-cloud-adoption-framework_instructions.html

6.7 KB

/.../04_data-management-and-administration/

01_privacy-principles.en.srt

10.2 KB

01_privacy-principles.en.txt

5.4 KB

01_privacy-principles.mp4

13.9 MB

02_service-trust-portal.en.srt

7.9 KB

02_service-trust-portal.en.txt

5.1 KB

02_service-trust-portal.mp4

12.1 MB

03_customer-privacy_instructions.html

683.2 KB

04_customer-privacy-controls_instructions.html

14.2 KB

05_cloud-security-posture-management-cspm.en.srt

9.4 KB

05_cloud-security-posture-management-cspm.en.txt

5.0 KB

05_cloud-security-posture-management-cspm.mp4

14.7 MB

06_resource-governance.en.srt

9.5 KB

06_resource-governance.en.txt

5.1 KB

06_resource-governance.mp4

11.1 MB

07_knowledge-check-data-management-and-administration_quiz.html

6.1 KB

08_additional-resources-data-management-and-administration_instructions.html

7.1 KB

/.../05_availability-and-continuity/

01_introduction-to-availability-and-continuity.en.srt

12.1 KB

01_introduction-to-availability-and-continuity.en.txt

6.5 KB

01_introduction-to-availability-and-continuity.mp4

16.0 MB

02_business-continuity-management.en.srt

12.6 KB

02_business-continuity-management.en.txt

6.6 KB

02_business-continuity-management.mp4

16.2 MB

03_region-and-availability-zones.en.srt

10.4 KB

03_region-and-availability-zones.en.txt

5.5 KB

03_region-and-availability-zones.mp4

15.1 MB

04_continuity-planning_instructions.html

225.8 KB

05_availability-and-resiliency.en.srt

9.1 KB

05_availability-and-resiliency.en.txt

5.8 KB

05_availability-and-resiliency.mp4

15.3 MB

06_availability-and-resiliency-testing_instructions.html

423.9 KB

07_reliability-monitoring.en.srt

11.8 KB

07_reliability-monitoring.en.txt

6.3 KB

07_reliability-monitoring.mp4

15.9 MB

08_availability-and-resiliency-by-design.en.srt

10.3 KB

08_availability-and-resiliency-by-design.en.txt

6.6 KB

08_availability-and-resiliency-by-design.mp4

15.1 MB

09_geographically-distributed-applications_instructions.html

167.5 KB

10_geographically-distributed-data-considerations_instructions.html

48.9 KB

11_knowledge-check-availability-and-continuity_quiz.html

6.8 KB

12_module-summary-security-administration.en.srt

14.9 KB

12_module-summary-security-administration.en.txt

8.0 KB

12_module-summary-security-administration.mp4

17.3 MB

13_additional-resources-availability-and-continuity_instructions.html

12.4 KB

/.../01_compliance-management/

01_introduction-to-compliance-management.en.srt

9.3 KB

01_introduction-to-compliance-management.en.txt

6.0 KB

01_introduction-to-compliance-management.mp4

14.9 MB

02_risk-assessment.en.srt

11.6 KB

02_risk-assessment.en.txt

6.1 KB

02_risk-assessment.mp4

14.8 MB

03_microsoft-purview-and-data.en.srt

9.1 KB

03_microsoft-purview-and-data.en.txt

5.8 KB

03_microsoft-purview-and-data.mp4

12.9 MB

04_microsoft-purview-and-record-management.en.srt

10.3 KB

04_microsoft-purview-and-record-management.en.txt

5.5 KB

04_microsoft-purview-and-record-management.mp4

13.3 MB

05_purview-portal.en.srt

9.3 KB

05_purview-portal.en.txt

5.8 KB

05_purview-portal.mp4

10.4 MB

06_data-mapping.en.srt

10.8 KB

06_data-mapping.en.txt

7.0 KB

06_data-mapping.mp4

16.4 MB

07_microsoft-purview-policy-concepts.en.srt

11.3 KB

07_microsoft-purview-policy-concepts.en.txt

6.0 KB

07_microsoft-purview-policy-concepts.mp4

14.2 MB

08_a-deeper-look-at-purview_instructions.html

836.2 KB

09_compliance-frameworks-and-data_instructions.html

88.3 KB

10_compliance-frameworks-and-records_instructions.html

712.5 KB

11_knowledge-check-compliance-management_quiz.html

5.2 KB

12_additional-resources-compliance-management_instructions.html

8.4 KB

/.../02_insider-risk/

01_understanding-insider-risk.en.srt

10.9 KB

01_understanding-insider-risk.en.txt

5.8 KB

01_understanding-insider-risk.mp4

12.6 MB

02_insider-risk-management.en.srt

11.9 KB

02_insider-risk-management.en.txt

6.3 KB

02_insider-risk-management.mp4

14.8 MB

03_insider-threat-response.en.srt

12.3 KB

03_insider-threat-response.en.txt

6.5 KB

03_insider-threat-response.mp4

17.2 MB

04_identifying-and-mitigating-insider-threats.en.srt

13.4 KB

04_identifying-and-mitigating-insider-threats.en.txt

7.1 KB

04_identifying-and-mitigating-insider-threats.mp4

17.6 MB

05_communication-compliance_instructions.html

300.8 KB

06_exercise-identify-and-respond_instructions.html

8.7 KB

07_self-review-identify-and-respond_quiz.html

4.4 KB

08_knowledge-check-insider-risk_quiz.html

4.6 KB

09_additional-resources-insider-risk_instructions.html

6.6 KB

/.../03_information-protection-and-data-lifecycle/

01_data-lifecycle.en.srt

9.0 KB

01_data-lifecycle.en.txt

5.7 KB

01_data-lifecycle.mp4

13.5 MB

02_purview-and-the-data-lifecycle.en.srt

7.4 KB

02_purview-and-the-data-lifecycle.en.txt

4.7 KB

02_purview-and-the-data-lifecycle.mp4

11.5 MB

03_data-concerns.en.srt

8.3 KB

03_data-concerns.en.txt

4.5 KB

03_data-concerns.mp4

30.3 MB

04_information-governance.en.srt

10.5 KB

04_information-governance.en.txt

5.6 KB

04_information-governance.mp4

12.8 MB

05_labeling-and-classifying-data.en.srt

9.6 KB

05_labeling-and-classifying-data.en.txt

5.2 KB

05_labeling-and-classifying-data.mp4

12.1 MB

06_data-security-and-mobility_instructions.html

1.9 MB

07_knowledge-check-information-protection-and-data-lifecycle_quiz.html

5.0 KB

08_module-summary-compliance-solutions.en.srt

10.0 KB

08_module-summary-compliance-solutions.en.txt

5.3 KB

08_module-summary-compliance-solutions.mp4

11.1 MB

09_additional-resources-information-protection-and-data-lifecycle_instructions.html

7.3 KB

/.../01_information-security-management-act-isma/

01_federal-information-security-management-act-fisma.en.srt

10.4 KB

01_federal-information-security-management-act-fisma.en.txt

6.6 KB

01_federal-information-security-management-act-fisma.mp4

14.6 MB

02_cybersecurity-framework-nist-national-institute-of-standards-and-technology.en.srt

14.7 KB

02_cybersecurity-framework-nist-national-institute-of-standards-and-technology.en.txt

7.7 KB

02_cybersecurity-framework-nist-national-institute-of-standards-and-technology.mp4

19.4 MB

03_sarbanes-oxley-sox-regulations.en.srt

11.4 KB

03_sarbanes-oxley-sox-regulations.en.txt

6.0 KB

03_sarbanes-oxley-sox-regulations.mp4

13.7 MB

04_general-data-protection-regulation-gdpr.en.srt

9.3 KB

04_general-data-protection-regulation-gdpr.en.txt

5.9 KB

04_general-data-protection-regulation-gdpr.mp4

14.4 MB

05_knowledge-check-information-security-management-act_quiz.html

4.9 KB

06_additional-resources-information-security-management-act_instructions.html

4.5 KB

/.../02_iso-international-organization-for-standardization-standards/

01_introduction-to-iso-standards-for-security.en.srt

12.1 KB

01_introduction-to-iso-standards-for-security.en.txt

6.4 KB

01_introduction-to-iso-standards-for-security.mp4

16.5 MB

02_security-standard-compliance_instructions.html

781.2 KB

03_azure-blueprint.en.srt

10.2 KB

03_azure-blueprint.en.txt

6.6 KB

03_azure-blueprint.mp4

15.7 MB

04_blueprint-simplifies-compliance-stage-one.en.srt

6.7 KB

04_blueprint-simplifies-compliance-stage-one.en.txt

4.2 KB

04_blueprint-simplifies-compliance-stage-one.mp4

7.4 MB

04_blueprint-simplifies-compliance-stage-one_Azure_Resource_Manager_template_code.txt

1.4 KB

05_blueprint-simplifies-compliance-stage-two.en.srt

3.9 KB

05_blueprint-simplifies-compliance-stage-two.en.txt

2.0 KB

05_blueprint-simplifies-compliance-stage-two.mp4

6.5 MB

06_creating-a-blueprint_instructions.html

1.1 MB

07_activity-create-a-blueprint_instructions.html

6.2 KB

08_knowledge-check-iso-standards_quiz.html

5.5 KB

09_additional-resources-iso-standards_instructions.html

7.2 KB

/.../03_control-objectives-for-information-and-related-technologies-cobit/

01_what-is-cobit.en.srt

14.6 KB

01_what-is-cobit.en.txt

7.6 KB

01_what-is-cobit.mp4

16.4 MB

02_nist-cobit-and-the-microsoft-azure-audit-program-defining-steps.en.srt

13.1 KB

02_nist-cobit-and-the-microsoft-azure-audit-program-defining-steps.en.txt

7.0 KB

02_nist-cobit-and-the-microsoft-azure-audit-program-defining-steps.mp4

16.6 MB

03_nist-cobit-and-the-microsoft-azure-audit-program-monitoring-change.en.srt

10.0 KB

03_nist-cobit-and-the-microsoft-azure-audit-program-monitoring-change.en.txt

5.3 KB

03_nist-cobit-and-the-microsoft-azure-audit-program-monitoring-change.mp4

13.9 MB

04_knowledge-check-cobit_quiz.html

5.8 KB

05_module-summary-laws-and-standards.en.srt

8.6 KB

05_module-summary-laws-and-standards.en.txt

5.6 KB

05_module-summary-laws-and-standards.mp4

11.7 MB

06_additional-resources-control-objectives-for-information-and-related-technologies_instructions.html

5.9 KB

/.../01_final-project-and-assessment-cybersecurity-management-and-compliance/

01_course-recap-cybersecurity-management-and-compliance.en.srt

10.4 KB

01_course-recap-cybersecurity-management-and-compliance.en.txt

6.7 KB

01_course-recap-cybersecurity-management-and-compliance.mp4

15.2 MB

02_about-the-final-project-and-assessment-cybersecurity-management-and-compliance_instructions.html

12.8 KB

03_exercise-achieving-compliance_instructions.html

10.7 KB

04_clean-up-resources_instructions.html

3.2 KB

/.../02_course-wrap-up-cybersecurity-management-and-compliance/

01_congratulations.en.srt

7.9 KB

01_congratulations.en.txt

4.2 KB

01_congratulations.mp4

9.3 MB

02_next-steps_instructions.html

5.1 KB

/.../01_azure-resource-manager-template-code/

01__resources.html

2.4 KB

/Coursera - Cybersecurity Solutions and Microsoft Defender 2024-1/

Readme.txt

0.1 KB

/.../01_course-introduction/

01_introduction-to-the-course.en.srt

7.4 KB

01_introduction-to-the-course.en.txt

4.7 KB

01_introduction-to-the-course.mp4

15.3 MB

02_course-syllabus_instructions.html

8.5 KB

03_how-to-be-successful-in-this-course_instructions.html

6.6 KB

04_microsoft-azure-active-directory-name-change_instructions.html

3.4 KB

05_clean-up-resources_instructions.html

3.2 KB

06_how-to-open-an-image-in-a-new-tab_instructions.html

75.7 KB

07_additional-resources-azure-basic-security-capabilities_instructions.html

2.6 KB

/.../02_distributed-denial-of-service-ddos-protection/

01_azure-ddos-protection-overview.en.srt

11.6 KB

01_azure-ddos-protection-overview.en.txt

6.1 KB

01_azure-ddos-protection-overview.mp4

22.3 MB

02_azure-ddos-protection-configuration.en.srt

6.9 KB

02_azure-ddos-protection-configuration.en.txt

4.4 KB

02_azure-ddos-protection-configuration.mp4

11.3 MB

03_azure-ddos-protection-features-and-best-practices.en.srt

9.4 KB

03_azure-ddos-protection-features-and-best-practices.en.txt

6.0 KB

03_azure-ddos-protection-features-and-best-practices.mp4

16.8 MB

04_azure-ddos-network-protection-in-detail_instructions.html

1.1 MB

05_azure-and-virtual-machines.en.srt

4.8 KB

05_azure-and-virtual-machines.en.txt

2.6 KB

05_azure-and-virtual-machines.mp4

9.5 MB

06_spinning-up-a-virtual-machine.en.srt

4.8 KB

06_spinning-up-a-virtual-machine.en.txt

3.1 KB

06_spinning-up-a-virtual-machine.mp4

5.2 MB

07_exercise-create-a-windows-virtual-machine-in-the-azure-portal_instructions.html

13.7 KB

08_self-review-create-a-windows-virtual-machine-in-the-azure-portal_quiz.html

2.3 KB

09_clean-up-resources_instructions.html

3.2 KB

10_knowledge-check-ddos-protection_quiz.html

5.4 KB

11_additional-resources-ddos-protection_instructions.html

3.7 KB

/.../03_azure-firewall-protection/

01_azure-networking.en.srt

12.2 KB

01_azure-networking.en.txt

6.3 KB

01_azure-networking.mp4

21.5 MB

02_introduction-to-azure-firewall.en.srt

7.1 KB

02_introduction-to-azure-firewall.en.txt

4.6 KB

02_introduction-to-azure-firewall.mp4

12.6 MB

03_azure-firewall-standard-and-basic.en.srt

8.2 KB

03_azure-firewall-standard-and-basic.en.txt

4.4 KB

03_azure-firewall-standard-and-basic.mp4

16.0 MB

04_web-application-firewall.en.srt

0.0 KB

04_web-application-firewall.en.txt

0.0 KB

04_web-application-firewall.mp4

16.3 MB

05_azure-firewall-in-depth_instructions.html

765.1 KB

06_activity-resource-group-vnet-creation_instructions.html

10.1 KB

07_azure-firewall-deployment.en.srt

4.7 KB

07_azure-firewall-deployment.en.txt

2.5 KB

07_azure-firewall-deployment.mp4

4.6 MB

08_azure-firewall-rule-configuration.en.srt

9.1 KB

08_azure-firewall-rule-configuration.en.txt

4.8 KB

08_azure-firewall-rule-configuration.mp4

8.6 MB

09_exercise-configure-azure-firewall_instructions.html

16.7 KB

10_self-review-configure-azure-firewall_quiz.html

2.1 KB

11_hackers-and-firewalls.en.srt

7.5 KB

11_hackers-and-firewalls.en.txt

4.0 KB

11_hackers-and-firewalls.mp4

49.8 MB

12_knowledge-check-azure-firewall-protection_quiz.html

5.2 KB

13_additional-resources-azure-firewall-protection_instructions.html

2.8 KB

/.../04_just-in-time-access-and-encryption/

01_just-in-time-access-jit.en.srt

7.3 KB

01_just-in-time-access-jit.en.txt

3.9 KB

01_just-in-time-access-jit.mp4

13.5 MB

02_key-management-and-encryption.en.srt

8.3 KB

02_key-management-and-encryption.en.txt

5.4 KB

02_key-management-and-encryption.mp4

15.5 MB

03_jit-and-encryption_instructions.html

213.3 KB

04_implementing-just-in-time-access.en.srt

4.3 KB

04_implementing-just-in-time-access.en.txt

2.8 KB

04_implementing-just-in-time-access.mp4

10.9 MB

05_best-practices-for-securing-azure-resources_instructions.html

201.0 KB

06_knowledge-check-just-in-time-access-and-encryption_quiz.html

5.7 KB

07_exercise-secure-ports-with-jit_instructions.html

8.8 KB

08_self-review-secure-ports-with-jit_quiz.html

2.1 KB

09_module-summary-azure-basic-security-capabilities.en.srt

12.8 KB

09_module-summary-azure-basic-security-capabilities.en.txt

6.8 KB

09_module-summary-azure-basic-security-capabilities.mp4

18.8 MB

10_additional-resources-just-in-time-access-and-encryption_instructions.html

3.3 KB

/.../01_introduction-to-cloud-security/

01_overview-of-cloud-security.en.srt

8.2 KB

01_overview-of-cloud-security.en.txt

4.4 KB

01_overview-of-cloud-security.mp4

15.9 MB

02_advanced-cloud-security.en.srt

5.7 KB

02_advanced-cloud-security.en.txt

3.7 KB

02_advanced-cloud-security.mp4

10.2 MB

03_azure-security.en.srt

10.4 KB

03_azure-security.en.txt

5.5 KB

03_azure-security.mp4

17.4 MB

04_azure-security-best-practices.en.srt

6.1 KB

04_azure-security-best-practices.en.txt

3.9 KB

04_azure-security-best-practices.mp4

10.9 MB

05_azure-security-in-depth_instructions.html

7.0 KB

06_additional-resources-introduction-to-cloud-security_instructions.html

3.8 KB

/.../02_virtual-security-solutions/

01_microsoft-defender-interface.en.srt

9.7 KB

01_microsoft-defender-interface.en.txt

5.1 KB

01_microsoft-defender-interface.mp4

13.9 MB

02_azure-bastion.en.srt

9.4 KB

02_azure-bastion.en.txt

5.0 KB

02_azure-bastion.mp4

17.4 MB

03_bastion-and-virtual-machines.en.srt

7.4 KB

03_bastion-and-virtual-machines.en.txt

3.9 KB

03_bastion-and-virtual-machines.mp4

8.0 MB

04_exercise-shield-virtual-machines-using-bastion_instructions.html

10.1 KB

05_additional-resources-virtual-security-solutions_instructions.html

3.5 KB

/.../03_azure-standards-and-policies/

01_introduction-to-azure-policies.en.srt

8.4 KB

01_introduction-to-azure-policies.en.txt

5.4 KB

01_introduction-to-azure-policies.mp4

15.0 MB

02_managing-azure-policies_instructions.html

595.7 KB

03_working-with-policy-definitions-in-azure_instructions.html

1.8 MB

04_custom-policy-definition.en.srt

5.9 KB

04_custom-policy-definition.en.txt

3.8 KB

04_custom-policy-definition.mp4

9.7 MB

05_azure-blueprints.en.srt

5.9 KB

05_azure-blueprints.en.txt

3.2 KB

05_azure-blueprints.mp4

12.4 MB

06_types-of-policies_instructions.html

581.9 KB

07_additional-resources-azure-standards-and-policies_instructions.html

3.1 KB

/.../04_introduction-to-siem-and-soar/

01_siem.en.srt

6.9 KB

01_siem.en.txt

3.6 KB

01_siem.mp4

12.6 MB

02_microsoft-sentinel.en.srt

6.6 KB

02_microsoft-sentinel.en.txt

3.5 KB

02_microsoft-sentinel.mp4

11.5 MB

03_microsoft-sentinel-data-connectors.en.srt

8.3 KB

03_microsoft-sentinel-data-connectors.en.txt

5.3 KB

03_microsoft-sentinel-data-connectors.mp4

17.8 MB

04_expanding-on-sentinel_instructions.html

1.9 MB

05_introducing-soar.en.srt

8.7 KB

05_introducing-soar.en.txt

4.6 KB

05_introducing-soar.mp4

13.4 MB

06_siem-and-soar-use-case_instructions.html

3.2 MB

07_guided-project-intro-configure-microsoft-sentinel-to-ingest-data-and-detect_instructions.html

2.7 KB

08_module-summary-security-management-in-azure.en.srt

12.6 KB

08_module-summary-security-management-in-azure.en.txt

6.6 KB

08_module-summary-security-management-in-azure.mp4

19.3 MB

09_additional-resources-introduction-to-siem-and-soar_instructions.html

3.7 KB

/.../01_defender-services/

01_introduction-to-microsoft-365-defender.en.srt

10.1 KB

01_introduction-to-microsoft-365-defender.en.txt

6.4 KB

01_introduction-to-microsoft-365-defender.mp4

23.4 MB

02_microsoft-365-defender-portal.en.srt

6.0 KB

02_microsoft-365-defender-portal.en.txt

3.8 KB

02_microsoft-365-defender-portal.mp4

13.2 MB

03_microsoft-365-defender-incidents-and-alerts.en.srt

9.0 KB

03_microsoft-365-defender-incidents-and-alerts.en.txt

5.8 KB

03_microsoft-365-defender-incidents-and-alerts.mp4

16.3 MB

04_working-with-microsoft-365-defender-portal_Attack_story_video.mp4

2.0 MB

04_working-with-microsoft-365-defender-portal_instructions.html

3.8 MB

05_microsoft-defender-use-case-office-365_instructions.html

117.0 KB

06_managing-users.en.srt

9.0 KB

06_managing-users.en.txt

4.8 KB

06_managing-users.mp4

16.2 MB

07_exercise-implement-microsoft-sentinel-with-microsoft-defender-data-connectors_instructions.html

9.9 KB

08_additional-resources-defender-services_instructions.html

4.5 KB

/.../02_endpoints-and-cloud-apps-security/

01_introduction-to-endpoint-security.en.srt

11.0 KB

01_introduction-to-endpoint-security.en.txt

5.8 KB

01_introduction-to-endpoint-security.mp4

20.5 MB

02_endpoint-modernization.en.srt

8.5 KB

02_endpoint-modernization.en.txt

5.5 KB

02_endpoint-modernization.mp4

21.1 MB

03_deployment-methods-for-waas-and-microsoft-365-apps.en.srt

10.2 KB

03_deployment-methods-for-waas-and-microsoft-365-apps.en.txt

5.4 KB

03_deployment-methods-for-waas-and-microsoft-365-apps.mp4

19.4 MB

04_defender-portal-for-endpoint-capabilities-and-services.en.srt

9.4 KB

04_defender-portal-for-endpoint-capabilities-and-services.en.txt

5.0 KB

04_defender-portal-for-endpoint-capabilities-and-services.mp4

18.1 MB

05_defender-services-in-depth_instructions.html

561.2 KB

06_threat-technologies.en.srt

10.0 KB

06_threat-technologies.en.txt

5.3 KB

06_threat-technologies.mp4

18.6 MB

07_next-gen-antivirus-and-endpoint-response_instructions.html

120.0 KB

08_endpoint-encryption.en.srt

8.4 KB

08_endpoint-encryption.en.txt

4.4 KB

08_endpoint-encryption.mp4

14.0 MB

09_additional-resources-endpoints-and-cloud-apps-security_instructions.html

3.8 KB

/.../03_identity-defense/

01_introduction-to-identity-defense.en.srt

9.7 KB

01_introduction-to-identity-defense.en.txt

6.3 KB

01_introduction-to-identity-defense.mp4

19.7 MB

02_microsoft-purview.en.srt

10.7 KB

02_microsoft-purview.en.txt

5.7 KB

02_microsoft-purview.mp4

16.7 MB

03_azure-active-directory-identity-protection.en.srt

10.2 KB

03_azure-active-directory-identity-protection.en.txt

5.5 KB

03_azure-active-directory-identity-protection.mp4

21.4 MB

04_microsoft-defender-for-identity.en.srt

6.1 KB

04_microsoft-defender-for-identity.en.txt

4.0 KB

04_microsoft-defender-for-identity.mp4

12.6 MB

05_deploy-microsoft-defender-for-identity-with-microsoft-365-defender-preparation.en.srt

7.6 KB

05_deploy-microsoft-defender-for-identity-with-microsoft-365-defender-preparation.en.txt

4.9 KB

05_deploy-microsoft-defender-for-identity-with-microsoft-365-defender-preparation.mp4

14.1 MB

06_deploy-microsoft-defender-for-identity-with-microsoft-365-defender-deployment_instructions.html

4.3 MB

07_identity-theft.en.srt

4.8 KB

07_identity-theft.en.txt

3.1 KB

07_identity-theft.mp4

33.2 MB

08_identity-protection-in-microsoft-365_instructions.html

116.8 KB

09_module-summary-microsoft-365-defender-threat-protection.en.srt

10.8 KB

09_module-summary-microsoft-365-defender-threat-protection.en.txt

5.8 KB

09_module-summary-microsoft-365-defender-threat-protection.mp4

17.2 MB

10_additional-resources-identity-defense_instructions.html

3.2 KB

/.../01_final-project-and-assessment-cybersecurity-solutions-and-microsoft-defender/

01_course-recap-security-solutions.en.srt

9.9 KB

01_course-recap-security-solutions.en.txt

5.3 KB

01_course-recap-security-solutions.mp4

17.6 MB

02_about-the-final-project-and-assessment-cybersecurity-solutions-and-microsoft_instructions.html

13.5 KB

03_exercise-securing-virtual-machines_instructions.html

15.4 KB

04_clean-up-resources_instructions.html

3.2 KB

/.../02_course-wrap-up/

01_congratulations.en.srt

7.9 KB

01_congratulations.en.txt

4.3 KB

01_congratulations.mp4

13.7 MB

02_next-steps_instructions.html

5.2 KB

/Coursera - Cybersecurity Threat Vectors and Mitigation 2024-1/

Readme.txt

0.1 KB

/.../01_course-introduction/

01_introduction-to-the-course-cybersecurity-threat-vectors-and-mitigation.en.srt

8.0 KB

01_introduction-to-the-course-cybersecurity-threat-vectors-and-mitigation.en.txt

4.3 KB

01_introduction-to-the-course-cybersecurity-threat-vectors-and-mitigation.mp4

9.4 MB

02_course-syllabus_instructions.html

9.9 KB

03_how-to-be-successful-in-this-course_instructions.html

6.6 KB

04_how-to-open-an-image-in-a-new-tab_instructions.html

75.7 KB

05_additional-resources-threats-and-attacks_instructions.html

5.5 KB

/.../02_epic-attacks/

01_introduction-to-cyber-attacks.en.srt

9.3 KB

01_introduction-to-cyber-attacks.en.txt

4.9 KB

01_introduction-to-cyber-attacks.mp4

15.1 MB

02_wannacry-ransomware-attack_instructions.html

602.3 KB

03_stuxnet-worm_instructions.html

1.1 MB

04_trojans-and-viruses.en.srt

10.8 KB

04_trojans-and-viruses.en.txt

5.9 KB

04_trojans-and-viruses.mp4

14.2 MB

05_data-breaches_instructions.html

47.8 KB

06_knowledge-check-epic-attacks_quiz.html

4.8 KB

07_additional-resources-epic-attacks_instructions.html

5.2 KB

/.../03_threat-vectors/

01_introduction-to-threat-vectors.en.srt

8.7 KB

01_introduction-to-threat-vectors.en.txt

5.4 KB

01_introduction-to-threat-vectors.mp4

13.2 MB

02_malware-and-ransomware.en.srt

11.0 KB

02_malware-and-ransomware.en.txt

5.8 KB

02_malware-and-ransomware.mp4

11.1 MB

03_evading-detection_instructions.html

393.1 KB

04_malware-and-ransomware-in-action_instructions.html

8.1 KB

05_phishing-and-social-engineering.en.srt

10.8 KB

05_phishing-and-social-engineering.en.txt

5.9 KB

05_phishing-and-social-engineering.mp4

14.4 MB

06_types-of-phishing_instructions.html

1.3 MB

07_threats.en.srt

5.0 KB

07_threats.en.txt

2.7 KB

07_threats.mp4

18.6 MB

08_other-threat-vectors_instructions.html

1.1 MB

09_knowledge-check-threat-vectors_quiz.html

4.8 KB

10_additional-resources-threat-vectors_instructions.html

6.1 KB

/.../04_mitigation-strategies/

01_personal-mitigation-strategies.en.srt

9.7 KB

01_personal-mitigation-strategies.en.txt

5.1 KB

01_personal-mitigation-strategies.mp4

13.8 MB

02_biometrics_instructions.html

224.3 KB

03_security-software.en.srt

8.4 KB

03_security-software.en.txt

5.3 KB

03_security-software.mp4

11.9 MB

04_firewalls-and-antivirus_instructions.html

102.8 KB

05_protecting-data_instructions.html

45.5 KB

06_knowledge-check-mitigation-strategies_quiz.html

4.9 KB

07_module-summary-threats-and-attacks.en.srt

11.3 KB

07_module-summary-threats-and-attacks.en.txt

6.0 KB

07_module-summary-threats-and-attacks.mp4

14.9 MB

08_additional-resources-mitigation-strategies_instructions.html

5.1 KB

/02_cryptography/01_encryption/

01_introduction-to-encryption.en.srt

6.3 KB

01_introduction-to-encryption.en.txt

4.1 KB

01_introduction-to-encryption.mp4

11.1 MB

02_evolution-of-encryption_instructions.html

3.0 MB

03_modern-encryptions.en.srt

6.2 KB

03_modern-encryptions.en.txt

4.0 KB

03_modern-encryptions.mp4

10.9 MB

04_encryption-tools_instructions.html

1.1 MB

05_exercise-initial-protective-measures_instructions.html

6.4 KB

06_self-review-initial-protective-measures_quiz.html

3.3 KB

07_knowledge-check-encryption_quiz.html

5.1 KB

08_additional-resources-encryption_instructions.html

3.6 KB

/.../02_public-private-key-and-hashing/

01_private-key-and-symmetric-encryption.en.srt

7.7 KB

01_private-key-and-symmetric-encryption.en.txt

4.9 KB

01_private-key-and-symmetric-encryption.mp4

12.0 MB

02_the-formation-of-symmetric-standards_instructions.html

20.9 MB

03_public-key-and-asymmetric-encryption.en.srt

9.6 KB

03_public-key-and-asymmetric-encryption.en.txt

5.1 KB

03_public-key-and-asymmetric-encryption.mp4

12.3 MB

04_the-formation-of-digital-signatures_instructions.html

139.9 KB

05_hashing.en.srt

6.7 KB

05_hashing.en.txt

4.3 KB

05_hashing.mp4

8.8 MB

06_list-of-hashing-and-encryption-techniques-and-algorithms_instructions.html

791.8 KB

07_the-power-of-encryption.en.srt

4.2 KB

07_the-power-of-encryption.en.txt

2.7 KB

07_the-power-of-encryption.mp4

21.7 MB

08_knowledge-check-public-private-and-key-hashing_quiz.html

4.5 KB

09_additional-resources-public-private-key-and-hashing_instructions.html

5.1 KB

/.../03_digital-signing-and-certificates/

01_digital-signing.en.srt

8.6 KB

01_digital-signing.en.txt

5.6 KB

01_digital-signing.mp4

12.3 MB

02_certificates-and-certificate-authorities.en.srt

9.6 KB

02_certificates-and-certificate-authorities.en.txt

5.1 KB

02_certificates-and-certificate-authorities.mp4

11.2 MB

03_secure-certificates_instructions.html

458.2 KB

04_signed-urls.en.srt

8.9 KB

04_signed-urls.en.txt

5.7 KB

04_signed-urls.mp4

11.0 MB

05_secure-communication-using-ssl-and-https_instructions.html

697.5 KB

06_knowledge-check-digital-signing-and-certificates_quiz.html

4.8 KB

07_additional-resources-digital-signing-and-certificates_instructions.html

3.5 KB

/.../04_authentication-and-authorization/

01_centralized-authentication-and-authorization-systems.en.srt

9.0 KB

01_centralized-authentication-and-authorization-systems.en.txt

5.7 KB

01_centralized-authentication-and-authorization-systems.mp4

12.4 MB

02_centralized-authentication-and-authorization-systems-examples_instructions.html

12.5 KB

03_authentication-and-authorization-methods.en.srt

8.5 KB

03_authentication-and-authorization-methods.en.txt

5.5 KB

03_authentication-and-authorization-methods.mp4

9.9 MB

04_knowledge-check-authentication-and-authorization_quiz.html

5.7 KB

05_module-summary-cryptography.en.srt

8.3 KB

05_module-summary-cryptography.en.txt

5.4 KB

05_module-summary-cryptography.mp4

10.5 MB

06_additional-resources-authentication-and-authorization_instructions.html

2.2 KB

/.../01_data-transmission/

01_data-transmission-threats.en.srt

10.6 KB

01_data-transmission-threats.en.txt

5.6 KB

01_data-transmission-threats.mp4

12.5 MB

02_data-transmission-intercept-tools_instructions.html

202.5 KB

03_virtual-private-network.en.srt

9.0 KB

03_virtual-private-network.en.txt

5.9 KB

03_virtual-private-network.mp4

15.1 MB

04_advanced-persistent-threats-apt.en.srt

8.6 KB

04_advanced-persistent-threats-apt.en.txt

5.5 KB

04_advanced-persistent-threats-apt.mp4

12.5 MB

05_apts-in-action_instructions.html

31.5 KB

06_iot-threats_instructions.html

80.0 KB

07_knowledge-check-data-transmission_quiz.html

4.9 KB

08_additional-resources-data-transmission_instructions.html

6.8 KB

/.../02_security-controls/

01_firewall-optimization.en.srt

9.0 KB

01_firewall-optimization.en.txt

4.8 KB

01_firewall-optimization.mp4

12.0 MB

02_firewall-configuration_instructions.html

1.3 MB

03_network-segmentation.en.srt

10.2 KB

03_network-segmentation.en.txt

5.3 KB

03_network-segmentation.mp4

12.9 MB

04_intrusion-detection-and-prevention-system.en.srt

8.6 KB

04_intrusion-detection-and-prevention-system.en.txt

5.5 KB

04_intrusion-detection-and-prevention-system.mp4

12.0 MB

05_endpoint-security_instructions.html

460.6 KB

06_exercise-walling-off_instructions.html

6.0 KB

07_self-review-walling-off_quiz.html

4.1 KB

08_knowledge-check-security-controls_quiz.html

4.5 KB

09_additional-resources-security-controls_instructions.html

3.6 KB

/.../03_application-updates/

01_introduction-to-application-updates.en.srt

10.2 KB

01_introduction-to-application-updates.en.txt

5.4 KB

01_introduction-to-application-updates.mp4

14.9 MB

02_keeping-applications-and-operating-systems-up-to-date_instructions.html

1.1 MB

03_bring-your-own-device-risks.en.srt

10.3 KB

03_bring-your-own-device-risks.en.txt

5.5 KB

03_bring-your-own-device-risks.mp4

15.2 MB

04_knowledge-check-application-updates_quiz.html

6.0 KB

05_module-summary-network-and-device-based-threats.en.srt

9.8 KB

05_module-summary-network-and-device-based-threats.en.txt

5.2 KB

05_module-summary-network-and-device-based-threats.mp4

13.1 MB

06_additional-resources-application-updates_instructions.html

4.5 KB

/.../01_security-and-compliance-concepts/

01_overview-of-security-compliance.en.srt

9.4 KB

01_overview-of-security-compliance.en.txt

5.0 KB

01_overview-of-security-compliance.mp4

14.2 MB

02_industry-standards-and-compliance-frameworks_instructions.html

340.0 KB

03_risk-management-and-compliance.en.srt

8.3 KB

03_risk-management-and-compliance.en.txt

5.3 KB

03_risk-management-and-compliance.mp4

12.4 MB

04_general-data-protection-regulation-gdpr_instructions.html

728.3 KB

05_browser-cookies-and-gdpr.en.srt

8.0 KB

05_browser-cookies-and-gdpr.en.txt

4.2 KB

05_browser-cookies-and-gdpr.mp4

10.8 MB

06_knowledge-check-security-and-compliance-concepts_quiz.html

6.8 KB

07_additional-resources-security-and-compliance-concepts_instructions.html

5.9 KB

/.../02_id-and-active-directory/

01_identity-management.en.srt

10.7 KB

01_identity-management.en.txt

5.7 KB

01_identity-management.mp4

14.1 MB

02_identity-management-in-action_instructions.html

626.2 KB

03_single-sign-on-sso.en.srt

8.3 KB

03_single-sign-on-sso.en.txt

5.3 KB

03_single-sign-on-sso.mp4

11.5 MB

04_active-directory-and-group-policy.en.srt

8.0 KB

04_active-directory-and-group-policy.en.txt

5.1 KB

04_active-directory-and-group-policy.mp4

13.2 MB

05_group-policies_instructions.html

181.7 KB

06_managing-identities-and-access-with-azure-active-directory_instructions.html

565.4 KB

07_knowledge-check-id-and-active-directory_quiz.html

5.9 KB

08_additional-resources-id-and-active-directory_instructions.html

3.1 KB

/.../03_defense-models/

01_defense-in-depth.en.srt

8.0 KB

01_defense-in-depth.en.txt

4.2 KB

01_defense-in-depth.mp4

10.0 MB

02_defense-in-depth-in-action_instructions.html

1.5 MB

03_cloud-security-and-defense-in-depth_instructions.html

229.9 KB

04_zero-trust-model.en.srt

9.7 KB

04_zero-trust-model.en.txt

5.2 KB

04_zero-trust-model.mp4

12.3 MB

05_security-operations-and-monitoring_instructions.html

75.1 KB

06_knowledge-check-defense-models_quiz.html

6.0 KB

07_module-summary-security-compliance-and-identity.en.srt

9.0 KB

07_module-summary-security-compliance-and-identity.en.txt

5.8 KB

07_module-summary-security-compliance-and-identity.mp4

15.3 MB

08_additional-resources-defense-models_instructions.html

3.2 KB

/.../01_final-course-project-and-assessment/

01_course-recap-cybersecurity-threat-vectors-and-mitigation.en.srt

9.9 KB

01_course-recap-cybersecurity-threat-vectors-and-mitigation.en.txt

6.4 KB

01_course-recap-cybersecurity-threat-vectors-and-mitigation.mp4

14.9 MB

02_about-the-final-course-project-and-assessment_instructions.html

6.5 KB

03_final-course-project-security-strategy_instructions.html

6.0 KB

/.../02_course-wrap-up/

01_congratulations.en.srt

5.5 KB

01_congratulations.en.txt

3.0 KB

01_congratulations.mp4

7.0 MB

02_next-steps_instructions.html

4.2 KB

/Coursera - Cybersecurity Tools and Technologies 2024-1/

Readme.txt

0.1 KB

/.../01_course-introduction/

01_introduction-to-the-course.en.srt

7.4 KB

01_introduction-to-the-course.en.txt

3.9 KB

01_introduction-to-the-course.mp4

11.1 MB

02_course-syllabus-cybersecurity-tools-and-technologies_instructions.html

8.3 KB

03_how-to-be-successful-in-this-course_instructions.html

6.6 KB

04_microsoft-azure-active-directory-name-change_instructions.html

3.4 KB

05_clean-up-resources_instructions.html

3.2 KB

06_how-to-open-an-image-in-a-new-tab_instructions.html

75.7 KB

07_additional-resources-course-introduction_instructions.html

4.4 KB

/.../02_defense-and-offense-red-versus-blue/

01_security-testing-and-ethical-hacking.en.srt

8.2 KB

01_security-testing-and-ethical-hacking.en.txt

5.4 KB

01_security-testing-and-ethical-hacking.mp4

12.7 MB

02_blue-team-responsibilities.en.srt

11.1 KB

02_blue-team-responsibilities.en.txt

5.9 KB

02_blue-team-responsibilities.mp4

13.9 MB

03_red-team-responsibilities.en.srt

11.0 KB

03_red-team-responsibilities.en.txt

5.8 KB

03_red-team-responsibilities.mp4

14.5 MB

04_red-versus-blue_instructions.html

160.1 KB

04_red-versus-blue_Microsoft_Enterprise_Cloud_Red_Teaming.pdf

1.1 MB

05_knowledge-check-defense-and-offense-red-versus-blue_quiz.html

4.9 KB

06_additional-resources-defense-and-offense-red-versus-blue_instructions.html

2.9 KB

/.../03_testing-stages/

01_penetration-testing-overview.en.srt

8.5 KB

01_penetration-testing-overview.en.txt

5.4 KB

01_penetration-testing-overview.mp4

16.7 MB

02_stage-1-reconnaissance.en.srt

6.1 KB

02_stage-1-reconnaissance.en.txt

3.9 KB

02_stage-1-reconnaissance.mp4

12.2 MB

03_stage-2-enumeration.en.srt

10.5 KB

03_stage-2-enumeration.en.txt

5.5 KB

03_stage-2-enumeration.mp4

15.7 MB

04_stage-3-exploitation.en.srt

6.3 KB

04_stage-3-exploitation.en.txt

4.0 KB

04_stage-3-exploitation.mp4

11.9 MB

05_stage-4-escalation.en.srt

9.6 KB

05_stage-4-escalation.en.txt

5.0 KB

05_stage-4-escalation.mp4

17.3 MB

06_stage-5-reporting-and-remediation.en.srt

7.5 KB

06_stage-5-reporting-and-remediation.en.txt

3.9 KB

06_stage-5-reporting-and-remediation.mp4

11.0 MB

07_penetration-testing-walkthrough_instructions.html

7.6 KB

08_att-ck-adversarial-tactics-techniques-and-common-knowledge-framework.en.srt

9.5 KB

08_att-ck-adversarial-tactics-techniques-and-common-knowledge-framework.en.txt

6.1 KB

08_att-ck-adversarial-tactics-techniques-and-common-knowledge-framework.mp4

17.6 MB

09_knowledge-check-testing-stages_quiz.html

4.9 KB

10_additional-resources-testing-stages_instructions.html

2.6 KB

/.../04_types-of-penetration-test/

01_black-box-testing.en.srt

9.9 KB

01_black-box-testing.en.txt

5.3 KB

01_black-box-testing.mp4

12.5 MB

02_white-box-testing.en.srt

9.3 KB

02_white-box-testing.en.txt

4.9 KB

02_white-box-testing.mp4

12.4 MB

03_grey-box-testing.en.srt

9.2 KB

03_grey-box-testing.en.txt

5.9 KB

03_grey-box-testing.mp4

16.5 MB

04_compliance-testing_instructions.html

672.9 KB

05_penetration-testing-tools_instructions.html

14.8 KB

06_exercise-penetration-testing-strategy_instructions.html

257.4 KB

07_self-review-penetration-testing-strategy_quiz.html

3.0 KB

08_clean-up-resources_instructions.html

3.2 KB

09_knowledge-check-types-of-penetration-tests_quiz.html

5.0 KB

10_module-summary-penetration-testing.en.srt

11.7 KB

10_module-summary-penetration-testing.en.txt

6.2 KB

10_module-summary-penetration-testing.mp4

18.2 MB

11_additional-resources-types-of-penetration-testing_instructions.html

2.4 KB

/.../01_intrusion-detection-and-prevention-systems/

01_introduction-to-intrusion-detection-and-prevention-systems-idps.en.srt

8.6 KB

01_introduction-to-intrusion-detection-and-prevention-systems-idps.en.txt

5.5 KB

01_introduction-to-intrusion-detection-and-prevention-systems-idps.mp4

19.7 MB

02_unpacking-internet-packets.en.srt

8.7 KB

02_unpacking-internet-packets.en.txt

5.5 KB

02_unpacking-internet-packets.mp4

16.2 MB

03_intrusion-detection-tools_instructions.html

1.4 MB

04_azure-firewall-premium-intrusion-detection-and-prevention-system-idps.en.srt

9.8 KB

04_azure-firewall-premium-intrusion-detection-and-prevention-system-idps.en.txt

5.1 KB

04_azure-firewall-premium-intrusion-detection-and-prevention-system-idps.mp4

17.7 MB

05_azure-idps-in-action.en.srt

6.5 KB

05_azure-idps-in-action.en.txt

3.4 KB

05_azure-idps-in-action.mp4

8.2 MB

06_different-threat-signature-types_instructions.html

21.8 KB

06_different-threat-signature-types_Reference_guide_Signature_categories.pdf

84.2 KB

07_idps-use-cases.en.srt

10.6 KB

07_idps-use-cases.en.txt

5.6 KB

07_idps-use-cases.mp4

18.5 MB

08_idps-best-practices_instructions.html

531.6 KB

09_incident-response_instructions.html

432.7 KB

10_knowledge-check-idps_quiz.html

4.8 KB

11_additional-resources-idps_instructions.html

2.9 KB

/.../02_designing-firewalls-solutions-in-azure/

01_introduction-to-firewall-design-in-azure.en.srt

10.8 KB

01_introduction-to-firewall-design-in-azure.en.txt

5.8 KB

01_introduction-to-firewall-design-in-azure.mp4

17.7 MB

02_azure-firewall-design-in-action_instructions.html

164.7 KB

03_azure-firewall-rule-design-and-configuration.en.srt

8.4 KB

03_azure-firewall-rule-design-and-configuration.en.txt

4.5 KB

03_azure-firewall-rule-design-and-configuration.mp4

12.9 MB

04_network-security-group-and-azure-firewall-integration.en.srt

8.2 KB

04_network-security-group-and-azure-firewall-integration.en.txt

4.4 KB

04_network-security-group-and-azure-firewall-integration.mp4

11.7 MB

05_advanced-firewall-design-patterns-in-azure_instructions.html

393.3 KB

06_best-practices-for-azure-firewall-design_instructions.html

16.5 KB

07_exercise-firewall-design-and-configuration_instructions.html

4.9 KB

08_self-review-firewall-design-and-configuration_quiz.html

3.8 KB

09_knowledge-check-configuring-firewalls_quiz.html

5.7 KB

10_additional-resources-configuring-firewalls_instructions.html

4.2 KB

/.../03_azure-virtual-private-network-vpn/

01_vpn-gateway.en.srt

8.9 KB

01_vpn-gateway.en.txt

4.7 KB

01_vpn-gateway.mp4

11.4 MB

02_how-azure-vpn-can-help-your-business.en.srt

10.5 KB

02_how-azure-vpn-can-help-your-business.en.txt

6.7 KB

02_how-azure-vpn-can-help-your-business.mp4

16.0 MB

03_configure-vpns-on-azure.en.srt

10.2 KB

03_configure-vpns-on-azure.en.txt

6.5 KB

03_configure-vpns-on-azure.mp4

17.6 MB

04_azure-point-to-site-vpn.en.srt

10.0 KB

04_azure-point-to-site-vpn.en.txt

5.3 KB

04_azure-point-to-site-vpn.mp4

13.5 MB

05_azure-configuration-for-point-to-site-vpn-vnet_C6M2L3_Item_06-_Creating_the_VNet_V3.mp4

4.3 MB

05_azure-configuration-for-point-to-site-vpn-vnet_instructions.html

436.2 KB

06_azure-configuration-for-point-to-site-vpn-gateway_C6M2L3_Item_08-_Setting_up_the_gateway_V2.mp4

4.6 MB

06_azure-configuration-for-point-to-site-vpn-gateway_instructions.html

618.0 KB

07_azure-configuration-for-point-to-site-vpn-connect_C6M2L3_Item_10-_Connection_steps_V2.mp4

3.9 MB

07_azure-configuration-for-point-to-site-vpn-connect_instructions.html

1.1 MB

08_best-practices-for-azure-vpn_instructions.html

8.6 KB

09_ip-addressing-and-subnets.en.srt

9.4 KB

09_ip-addressing-and-subnets.en.txt

6.0 KB

09_ip-addressing-and-subnets.mp4

14.5 MB

10_ip-addressing-and-subnets-setup-steps_instructions.html

8.5 KB

11_knowledge-check-azure-vpn_quiz.html

5.2 KB

12_additional-resources-azure-vpn_instructions.html

2.9 KB

/.../04_vulnerability-management/

01_introduction-to-vulnerability-management.en.srt

7.1 KB

01_introduction-to-vulnerability-management.en.txt

4.6 KB

01_introduction-to-vulnerability-management.mp4

11.8 MB

02_vulnerability-management-process.en.srt

9.2 KB

02_vulnerability-management-process.en.txt

5.8 KB

02_vulnerability-management-process.mp4

13.5 MB

03_security-control-vulnerability-management.en.srt

14.7 KB

03_security-control-vulnerability-management.en.txt

7.8 KB

03_security-control-vulnerability-management.mp4

14.5 MB

04_vulnerability-management-in-azure.en.srt

8.9 KB

04_vulnerability-management-in-azure.en.txt

5.7 KB

04_vulnerability-management-in-azure.mp4

13.4 MB

05_vulnerability-management-tools-in-azure_instructions.html

10.2 KB

06_knowledge-check-vulnerability-management_quiz.html

5.4 KB

07_module-summary-preventative-tools.en.srt

10.9 KB

07_module-summary-preventative-tools.en.txt

5.9 KB

07_module-summary-preventative-tools.mp4

15.9 MB

08_additional-resources-vulnerability-management_instructions.html

4.4 KB

/.../01_the-command-line-and-windows-powershell/

01_introduction-to-command-line.en.srt

13.6 KB

01_introduction-to-command-line.en.txt

7.1 KB

01_introduction-to-command-line.mp4

23.3 MB

02_command-line-in-action.en.srt

9.4 KB

02_command-line-in-action.en.txt

5.0 KB

02_command-line-in-action.mp4

13.8 MB

03_activity-basic-command-line_instructions.html

125.2 KB

03_activity-basic-command-line_Reference_guide_Basic_Command_Line.pdf

88.0 KB

04_introduction-to-windows-powershell.en.srt

8.4 KB

04_introduction-to-windows-powershell.en.txt

4.5 KB

04_introduction-to-windows-powershell.mp4

12.5 MB

05_introduction-to-windows-powershell-script_instructions.html

9.5 KB

06_windows-powershell-script-in-action.en.srt

12.8 KB

06_windows-powershell-script-in-action.en.txt

6.7 KB

06_windows-powershell-script-in-action.mp4

18.2 MB

07_command-line-tools_instructions.html

9.9 KB

08_best-practices-for-command-line-penetration-testing_instructions.html

8.2 KB

09_knowledge-check-the-command-line_quiz.html

5.0 KB

10_additional-resources-the-command-line_cc754340vws.11

76.1 KB

10_additional-resources-the-command-line_instructions.html

2.5 KB

/.../02_setting-up-azure-for-testing/

01_introduction-to-penetration-testing-on-azure.en.srt

9.1 KB

01_introduction-to-penetration-testing-on-azure.en.txt

5.8 KB

01_introduction-to-penetration-testing-on-azure.mp4

15.0 MB

02_how-does-azure-penetration-testing-work.en.srt

14.2 KB

02_how-does-azure-penetration-testing-work.en.txt

7.5 KB

02_how-does-azure-penetration-testing-work.mp4

18.3 MB

03_azure-penetration-test-overview.en.srt

10.3 KB

03_azure-penetration-test-overview.en.txt

5.5 KB

03_azure-penetration-test-overview.mp4

14.4 MB

04_azure-penetration-testing-guidelines_instructions.html

942.6 KB

05_getting-azure-ready.en.srt

10.5 KB

05_getting-azure-ready.en.txt

5.6 KB

05_getting-azure-ready.mp4

14.1 MB

06_penetration-testing-framework.en.srt

9.9 KB

06_penetration-testing-framework.en.txt

5.2 KB

06_penetration-testing-framework.mp4

14.1 MB

07_azure-security-settings.en.srt

9.2 KB

07_azure-security-settings.en.txt

5.8 KB

07_azure-security-settings.mp4

14.7 MB

08_defender-for-clouds-integrated-qualys-vulnerability-scanner_instructions.html

783.4 KB

09_knowledge-check-setting-up-azure-for-testing_quiz.html

4.8 KB

10_additional-resources-setting-up-azure-for-testing_instructions.html

3.4 KB

10_additional-resources-setting-up-azure-for-testing_qualys-securing-azure-with-qualys.pdf

5.7 MB

/.../03_running-the-test/

01_running-the-penetration-test-and-analyzing-the-result.en.srt

10.7 KB

01_running-the-penetration-test-and-analyzing-the-result.en.txt

5.7 KB

01_running-the-penetration-test-and-analyzing-the-result.mp4

17.3 MB

02_interpreting-scan-and-test-results_instructions.html

17.7 KB

03_penetration-testing-and-azure-security-center.en.srt

8.2 KB

03_penetration-testing-and-azure-security-center.en.txt

4.4 KB

03_penetration-testing-and-azure-security-center.mp4

10.9 MB

04_configuring-security-center-automation.en.srt

8.2 KB

04_configuring-security-center-automation.en.txt

4.3 KB

04_configuring-security-center-automation.mp4

10.1 MB

05_penetration-testing-best-practices_instructions.html

564.9 KB

06_cold-wars-at-sams-scoops.en.srt

8.0 KB

06_cold-wars-at-sams-scoops.en.txt

4.1 KB

06_cold-wars-at-sams-scoops.mp4

38.4 MB

07_knowledge-check-running-the-test_quiz.html

5.7 KB

08_module-summary-azure-penetration-testing.en.srt

11.6 KB

08_module-summary-azure-penetration-testing.en.txt

7.5 KB

08_module-summary-azure-penetration-testing.mp4

21.1 MB

09_additional-resources-running-the-test_instructions.html

2.7 KB

/.../01_final-project-and-assessment-cybersecurity-tools-and-technologies/

01_course-recap-cybersecurity-tools-and-technologies.en.srt

10.7 KB

01_course-recap-cybersecurity-tools-and-technologies.en.txt

5.6 KB

01_course-recap-cybersecurity-tools-and-technologies.mp4

16.7 MB

02_about-the-final-project-and-assessment-cybersecurity-tools-and-technologies_instructions.html

8.8 KB

03_exercise-plan-of-attack_Diagram_assets.zip

14.3 KB

03_exercise-plan-of-attack_instructions.html

16.7 KB

04_clean-up-resources_instructions.html

3.2 KB

/.../02_wrap-up-cybersecurity-tools-and-technologies/

01_congratulations.en.srt

6.6 KB

01_congratulations.en.txt

4.3 KB

01_congratulations.mp4

13.1 MB

02_next-steps_instructions.html

5.4 KB

/Coursera - Introduction to Computers and Operating Systems and Security 2024-1/

Readme.txt

0.2 KB

/.../01_course-introduction/

01_introduction-to-the-program-microsoft-cybersecurity-analyst.en.srt

7.4 KB

01_introduction-to-the-program-microsoft-cybersecurity-analyst.en.txt

4.7 KB

01_introduction-to-the-program-microsoft-cybersecurity-analyst.mp4

33.1 MB

02_introduction-to-the-course-introduction-to-computers-and-operating-systems-and.en.srt

5.7 KB

02_introduction-to-the-course-introduction-to-computers-and-operating-systems-and.en.txt

3.6 KB

02_introduction-to-the-course-introduction-to-computers-and-operating-systems-and.mp4

13.8 MB

03_skills-measured-exam-sc-900_instructions.html

16.3 KB

04_course-syllabus_instructions.html

8.7 KB

05_how-to-be-successful-in-this-course_instructions.html

6.6 KB

06_a-day-in-the-life.en.srt

9.1 KB

06_a-day-in-the-life.en.txt

5.8 KB

06_a-day-in-the-life.mp4

14.8 MB

07_how-to-open-an-image-in-a-new-tab_instructions.html

75.7 KB

08_how-to-locate-your-downloaded-files_instructions.html

3.6 KB

09_additional-resources-microsoft-cybersecurity-analyst_instructions.html

4.2 KB

/.../02_threat-landscape/

01_threat-landscape-overview.en.srt

9.3 KB

01_threat-landscape-overview.en.txt

4.9 KB

01_threat-landscape-overview.mp4

12.6 MB

02_threat-stats_instructions.html

382.9 KB

03_linked-threats.en.srt

7.0 KB

03_linked-threats.en.txt

4.5 KB

03_linked-threats.mp4

12.1 MB

04_exercise-explaining-the-threat-landscape_instructions.html

8.1 KB

05_self-review-explaining-the-threat-landscape_quiz.html

2.6 KB

06_knowledge-check-elements-of-the-threat-landscape_quiz.html

4.4 KB

07_additional-resources-threat-landscape_instructions.html

4.7 KB

/.../03_introduction-to-computing-devices/

01_what-is-a-computer-and-what-is-inside-it.en.srt

6.9 KB

01_what-is-a-computer-and-what-is-inside-it.en.txt

4.4 KB

01_what-is-a-computer-and-what-is-inside-it.mp4

12.6 MB

02_hardware-versus-software_instructions.html

224.6 KB

03_how-does-a-computer-operate.en.srt

12.0 KB

03_how-does-a-computer-operate.en.txt

6.3 KB

03_how-does-a-computer-operate.mp4

17.2 MB

04_knowledge-check-introduction-to-computing-devices_quiz.html

3.6 KB

05_additional-resources-introduction-to-computing-devices_instructions.html

3.2 KB

/.../04_operating-systems/

01_what-is-an-operating-system-and-what-does-it-do.en.srt

7.3 KB

01_what-is-an-operating-system-and-what-does-it-do.en.txt

4.7 KB

01_what-is-an-operating-system-and-what-does-it-do.mp4

12.4 MB

02_types-of-operating-systems_instructions.html

340.4 KB

03_popular-operating-systems.en.srt

12.8 KB

03_popular-operating-systems.en.txt

6.6 KB

03_popular-operating-systems.mp4

18.0 MB

04_proprietary-and-open-source-software_instructions.html

6.7 KB

05_knowledge-check-operating-systems_quiz.html

3.8 KB

06_module-summary-introduction-to-computers-and-operating-systems.en.srt

5.5 KB

06_module-summary-introduction-to-computers-and-operating-systems.en.txt

3.5 KB

06_module-summary-introduction-to-computers-and-operating-systems.mp4

9.4 MB

07_additional-resources-operating-systems_instructions.html

4.0 KB

/.../01_servers-storage-and-backups/

01_infrastructure-and-servers.en.srt

10.2 KB

01_infrastructure-and-servers.en.txt

5.5 KB

01_infrastructure-and-servers.mp4

14.1 MB

02_types-of-servers-storage-and-backups_instructions.html

106.8 KB

03_risk-mitigation-backup-frequency.en.srt

9.1 KB

03_risk-mitigation-backup-frequency.en.txt

5.6 KB

03_risk-mitigation-backup-frequency.mp4

12.2 MB

04_knowledge-check-servers-storage-and-backup_quiz.html

4.0 KB

05_additional-resources-servers-storage-and-backup_instructions.html

3.1 KB

/.../02_computing-environments/

01_what-are-computing-environments.en.srt

10.8 KB

01_what-are-computing-environments.en.txt

5.7 KB

01_what-are-computing-environments.mp4

16.3 MB

02_traditional-versus-cloud-computing-environments_instructions.html

391.9 KB

03_security-in-computing-environments.en.srt

10.7 KB

03_security-in-computing-environments.en.txt

5.7 KB

03_security-in-computing-environments.mp4

16.9 MB

04_security-in-computing-environments-in-depth_instructions.html

411.8 KB

05_knowledge-check-computing-environments_quiz.html

3.8 KB

06_additional-resources-computing-environments_instructions.html

3.7 KB

/.../03_maintenance-and-patches/

01_what-is-maintenance-and-patching.en.srt

10.2 KB

01_what-is-maintenance-and-patching.en.txt

5.5 KB

01_what-is-maintenance-and-patching.mp4

14.9 MB

02_types-of-maintenance_instructions.html

122.7 KB

03_patch-management-pros-cons-and-challenges.en.srt

8.1 KB

03_patch-management-pros-cons-and-challenges.en.txt

4.3 KB

03_patch-management-pros-cons-and-challenges.mp4

12.1 MB

04_vulnerability-management_instructions.html

38.4 KB

05_knowledge-check-maintenance-and-patching_quiz.html

4.1 KB

06_module-summary-enterprise-systems-and-security.en.srt

9.0 KB

06_module-summary-enterprise-systems-and-security.en.txt

4.8 KB

06_module-summary-enterprise-systems-and-security.mp4

13.0 MB

07_additional-resources-maintenance-and-patching_instructions.html

4.0 KB

/.../01_business-software/

01_what-is-business-software.en.srt

9.1 KB

01_what-is-business-software.en.txt

4.9 KB

01_what-is-business-software.mp4

14.5 MB

02_common-business-software_instructions.html

340.1 KB

03_a-day-in-the-life-of-a-business-computer.en.srt

8.7 KB

03_a-day-in-the-life-of-a-business-computer.en.txt

4.6 KB

03_a-day-in-the-life-of-a-business-computer.mp4

15.1 MB

04_exercise-business-software_instructions.html

6.0 KB

05_self-review-business-software_quiz.html

2.5 KB

06_computers-under-pressure_instructions.html

279.7 KB

07_knowledge-check-business-software_quiz.html

3.6 KB

08_additional-resources-business-software_instructions.html

3.4 KB

/.../02_email-apps/

01_how-email-changed-the-world.en.srt

8.4 KB

01_how-email-changed-the-world.en.txt

5.3 KB

01_how-email-changed-the-world.mp4

17.8 MB

02_email-app-functions.en.srt

8.2 KB

02_email-app-functions.en.txt

5.2 KB

02_email-app-functions.mp4

11.7 MB

03_email-security-functions_instructions.html

155.3 KB

04_knowledge-check-email-apps_quiz.html

3.7 KB

05_additional-resources-email-apps_instructions.html

4.4 KB

/.../03_storage-solutions/

01_growing-your-knowledge-on-storage.en.srt

9.7 KB

01_growing-your-knowledge-on-storage.en.txt

5.1 KB

01_growing-your-knowledge-on-storage.mp4

12.7 MB

02_data-warehousing-and-data-lakes_instructions.html

171.3 KB

03_processing-data.en.srt

8.8 KB

03_processing-data.en.txt

4.6 KB

03_processing-data.mp4

12.8 MB

04_machine-learning-and-data.en.srt

9.0 KB

04_machine-learning-and-data.en.txt

4.8 KB

04_machine-learning-and-data.mp4

14.5 MB

05_machine-learning-in-action_instructions.html

651.6 KB

06_artificial-intelligence-and-machine-learning.en.srt

6.6 KB

06_artificial-intelligence-and-machine-learning.en.txt

3.6 KB

06_artificial-intelligence-and-machine-learning.mp4

25.9 MB

07_knowledge-check-storage-solutions_quiz.html

3.9 KB

08_module-summary-business-systems-applications.en.srt

8.8 KB

08_module-summary-business-systems-applications.en.txt

4.7 KB

08_module-summary-business-systems-applications.mp4

13.0 MB

09_additional-resources-storage-solutions_instructions.html

7.1 KB

/.../01_final-course-assessment/

01_course-recap-introduction-to-computers-and-operating-systems-and-security.en.srt

7.3 KB

01_course-recap-introduction-to-computers-and-operating-systems-and-security.en.txt

4.7 KB

01_course-recap-introduction-to-computers-and-operating-systems-and-security.mp4

12.0 MB

02_about-the-final-course-assessment_instructions.html

3.8 KB

/.../02_course-wrap-up/

01_congratulations.en.srt

5.5 KB

01_congratulations.en.txt

2.9 KB

01_congratulations.mp4

9.5 MB

02_next-steps_instructions.html

5.0 KB

/Coursera - Introduction to Networking and Cloud Computing 2024-1/

Readme.txt

0.1 KB

/.../01_course-introduction/

01_introduction-to-the-course-introduction-to-networking-and-cloud-computing.en.srt

9.9 KB

01_introduction-to-the-course-introduction-to-networking-and-cloud-computing.en.txt

5.2 KB

01_introduction-to-the-course-introduction-to-networking-and-cloud-computing.mp4

15.7 MB

02_course-syllabus_instructions.html

8.4 KB

03_how-to-be-successful-in-this-course_instructions.html

6.6 KB

04_how-to-open-an-image-in-a-new-tab_instructions.html

75.7 KB

05_additional-resources-computer-networking_instructions.html

2.3 KB

05_additional-resources-computer-networking_what-is-network-architecture.html

38.5 KB

/.../02_types-and-topologies/

01_network-types.en.srt

7.4 KB

01_network-types.en.txt

4.7 KB

01_network-types.mp4

15.5 MB

02_area-networks_instructions.html

14.9 KB

03_topologies.en.srt

10.5 KB

03_topologies.en.txt

5.5 KB

03_topologies.mp4

18.7 MB

04_physical-and-logical-topology_instructions.html

477.3 KB

05_data-transmission_instructions.html

425.7 KB

06_exercise-network-construction_instructions.html

3.9 KB

07_self-review-network-construction_quiz.html

2.2 KB

08_knowledge-check-understanding-types-and-topologies_quiz.html

3.9 KB

09_additional-resources-understanding-types-and-topologies_instructions.html

2.4 KB

09_additional-resources-understanding-types-and-topologies_network-topology.html

44.2 KB

09_additional-resources-understanding-types-and-topologies_what-is-a-lan-local-area-network.html

40.3 KB

/.../03_ip-addressing/

01_what-is-ip-and-whats-an-ip-address.en.srt

9.1 KB

01_what-is-ip-and-whats-an-ip-address.en.txt

5.6 KB

01_what-is-ip-and-whats-an-ip-address.mp4

17.3 MB

02_whats-the-difference-between-ipv4-and-ipv6_instructions.html

11.6 KB

03_exercise-find-your-ip_instructions.html

7.5 KB

04_self-review-find-your-ip_quiz.html

2.2 KB

05_using-ip-addresses-on-a-network.en.srt

9.4 KB

05_using-ip-addresses-on-a-network.en.txt

5.0 KB

05_using-ip-addresses-on-a-network.mp4

17.1 MB

06_how-does-a-device-get-its-ip-address_instructions.html

8.4 KB

07_knowledge-check-ip-addressing_quiz.html

3.1 KB

08_module-summary-computer-networking.en.srt

8.2 KB

08_module-summary-computer-networking.en.txt

5.2 KB

08_module-summary-computer-networking.mp4

16.9 MB

09_additional-resources-ip-addressing_dd379516vws.10

58.2 KB

09_additional-resources-ip-addressing_instructions.html

3.2 KB

/.../02_network-devices-and-protocols/01_infrastructure/

01_hybrid-networking.en.srt

12.1 KB

01_hybrid-networking.en.txt

6.4 KB

01_hybrid-networking.mp4

18.2 MB

02_the-internet_instructions.html

65.4 KB

03_introduction-to-cloud-computing.en.srt

8.5 KB

03_introduction-to-cloud-computing.en.txt

5.4 KB

03_introduction-to-cloud-computing.mp4

17.5 MB

04_infrastructure_instructions.html

4.7 KB

05_internet-of-things_instructions.html

387.7 KB

06_knowledge-check-infrastructure_quiz.html

4.1 KB

07_additional-resources-infrastructure_instructions.html

3.1 KB

/.../02_network-communication-models/

01_what-is-the-osi-model.en.srt

8.6 KB

01_what-is-the-osi-model.en.txt

5.5 KB

01_what-is-the-osi-model.mp4

13.8 MB

02_layered-architecture_instructions.html

393.4 KB

03_tcp-ip.en.srt

11.6 KB

03_tcp-ip.en.txt

6.2 KB

03_tcp-ip.mp4

17.7 MB

04_tcp-ip-versus-osi_instructions.html

2.7 MB

05_exercise-expanding-the-network-layout_instructions.html

3.7 KB

06_self-review-expanding-the-network-layout_quiz.html

2.4 KB

07_knowledge-check-network-communication-models_quiz.html

4.5 KB

08_additional-resources-network-communication-models_instructions.html

3.1 KB

08_additional-resources-network-communication-models_layer-2-understanding.html

174.9 KB

08_additional-resources-network-communication-models_tcpip.htm

34.8 KB

/.../03_protocols-and-ports/

01_what-is-a-port.en.srt

7.9 KB

01_what-is-a-port.en.txt

5.0 KB

01_what-is-a-port.mp4

14.3 MB

02_protocols_instructions.html

283.6 KB

03_ports-and-protocols.en.srt

7.9 KB

03_ports-and-protocols.en.txt

5.0 KB

03_ports-and-protocols.mp4

14.9 MB

04_reserved-and-commonly-allocated-ports_instructions.html

190.2 KB

04_reserved-and-commonly-allocated-ports_service-names-port-numbers.xhtml

52.3 KB

05_exercise-ports-in-use_instructions.html

8.0 KB

06_self-review-ports-in-use_quiz.html

2.2 KB

07_knowledge-check-protocols-and-ports_quiz.html

3.8 KB

08_additional-resources-protocols-and-ports_instructions.html

3.5 KB

08_additional-resources-protocols-and-ports_service-names-port-numbers.xhtml

52.3 KB

/.../04_network-traffic-monitoring/

01_dns-and-networking.en.srt

6.8 KB

01_dns-and-networking.en.txt

3.6 KB

01_dns-and-networking.mp4

10.7 MB

02_dns-attacks_instructions.html

249.1 KB

03_introduction-to-network-traffic-monitoring_instructions.html

316.4 KB

04_health-and-metric-analysis.en.srt

7.4 KB

04_health-and-metric-analysis.en.txt

4.0 KB

04_health-and-metric-analysis.mp4

13.1 MB

05_network-logs_instructions.html

3.2 MB

06_knowledge-check-network-traffic-monitoring_quiz.html

3.9 KB

07_module-summary-network-devices-and-protocols.en.srt

11.4 KB

07_module-summary-network-devices-and-protocols.en.txt

6.0 KB

07_module-summary-network-devices-and-protocols.mp4

17.3 MB

08_additional-resources-network-traffic-monitoring_instructions.html

3.5 KB

/.../01_network-client-and-server/

01_client-server-network.en.srt

9.8 KB

01_client-server-network.en.txt

5.2 KB

01_client-server-network.mp4

13.6 MB

02_client-server-models_instructions.html

187.9 KB

03_different-types-of-servers_instructions.html

7.3 KB

04_remote-access.en.srt

8.6 KB

04_remote-access.en.txt

5.4 KB

04_remote-access.mp4

19.4 MB

05_dynamic-host-configuration-protocol-dhcp_instructions.html

373.4 KB

06_knowledge-check-network-client-and-server_quiz.html

4.4 KB

07_additional-resources-network-client-and-server_instructions.html

3.8 KB

/.../02_authentication-and-authorization/

01_introduction-to-authentication.en.srt

10.1 KB

01_introduction-to-authentication.en.txt

6.4 KB

01_introduction-to-authentication.mp4

18.2 MB

02_authorization_instructions.html

14.1 KB

03_types-of-authorization.en.srt

9.7 KB

03_types-of-authorization.en.txt

6.1 KB

03_types-of-authorization.mp4

17.2 MB

04_internet-extranet-and-intranet_instructions.html

313.2 KB

05_authorization-protocols-on-vpns_instructions.html

185.4 KB

06_authentication-versus-authorization.en.srt

5.0 KB

06_authentication-versus-authorization.en.txt

2.6 KB

06_authentication-versus-authorization.mp4

15.5 MB

07_knowledge-check-authentication-and-authorization_quiz.html

4.6 KB

08_additional-resources-authentication-and-authorization_instructions.html

4.3 KB

/.../03_firewalls-and-security-tools/

01_common-network-attacks.en.srt

8.9 KB

01_common-network-attacks.en.txt

5.7 KB

01_common-network-attacks.mp4

17.8 MB

02_network-attacks_instructions.html

338.1 KB

03_network-security.en.srt

8.6 KB

03_network-security.en.txt

4.6 KB

03_network-security.mp4

14.2 MB

04_network-security-best-practices_instructions.html

590.7 KB

05_firewalls.en.srt

10.9 KB

05_firewalls.en.txt

5.8 KB

05_firewalls.mp4

18.9 MB

06_firewall-types_instructions.html

31.5 KB

07_firewall-rules_instructions.html

226.1 KB

08_security-tools.en.srt

7.8 KB

08_security-tools.en.txt

4.3 KB

08_security-tools.mp4

14.4 MB

09_firewall-threats-and-network-analysis_instructions.html

69.9 KB

10_knowledge-check-firewalls-and-security-tools_quiz.html

4.0 KB

11_module-summary-network-security.en.srt

10.2 KB

11_module-summary-network-security.en.txt

6.5 KB

11_module-summary-network-security.mp4

20.6 MB

12_additional-resources-firewalls-and-security-tools_instructions.html

6.5 KB

12_additional-resources-firewalls-and-security-tools_what-is-a-next-generation-firewall.html

51.9 KB

/.../01_introduction-to-azure/

01_what-is-azure.en.srt

9.7 KB

01_what-is-azure.en.txt

5.2 KB

01_what-is-azure.mp4

15.2 MB

02_what-is-cloud-computing_instructions.html

3.2 MB

03_what-services-are-available-with-azure_instructions.html

307.8 KB

04_business-enterprise-use-case.en.srt

6.1 KB

04_business-enterprise-use-case.en.txt

3.2 KB

04_business-enterprise-use-case.mp4

9.1 MB

05_azure-technologies_instructions.html

251.1 KB

06_exercise-cloud-transformation_instructions.html

5.5 KB

07_self-review-cloud-transformation_quiz.html

2.9 KB

08_knowledge-check-introduction-to-azure_quiz.html

4.5 KB

09_additional-resources-introduction-to-azure_instructions.html

4.7 KB

/.../02_virtual-environments/

01_what-is-virtualization.en.srt

8.6 KB

01_what-is-virtualization.en.txt

4.5 KB

01_what-is-virtualization.mp4

16.1 MB

02_what-are-virtual-environments-machines_instructions.html

9.4 KB

03_virtual-world.en.srt

4.1 KB

03_virtual-world.en.txt

2.6 KB

03_virtual-world.mp4

26.1 MB

04_azure-virtual-desktop.en.srt

7.4 KB

04_azure-virtual-desktop.en.txt

4.7 KB

04_azure-virtual-desktop.mp4

15.5 MB

05_virtual-machines-and-containers_instructions.html

246.6 KB

06_get-started-with-figma_instructions.html

253.3 KB

07_exercise-virtual-network-simulation_instructions.html

5.3 KB

07_exercise-virtual-network-simulation_Virtual_network_simulation_exercise_icons.zip

24.0 KB

08_self-review-virtual-network-simulation_quiz.html

2.1 KB

09_knowledge-check-virtual-environments_quiz.html

4.9 KB

10_additional-resources-virtual-environments_instructions.html

4.0 KB

/.../03_cloud-services/

01_cloud-capabilities.en.srt

10.6 KB

01_cloud-capabilities.en.txt

5.7 KB

01_cloud-capabilities.mp4

15.6 MB

02_cloud-capabilities-in-action_instructions.html

7.8 KB

03_machine-learning-services.en.srt

7.4 KB

03_machine-learning-services.en.txt

4.0 KB

03_machine-learning-services.mp4

11.9 MB

04_types-of-ai_instructions.html

5.9 KB

05_ai-business-uses.en.srt

7.7 KB

05_ai-business-uses.en.txt

4.1 KB

05_ai-business-uses.mp4

12.1 MB

06_cloud-and-ai_instructions.html

5.1 KB

07_knowledge-check-cloud-services_quiz.html

4.7 KB

08_additional-resources-cloud-services_instructions.html

3.3 KB

/.../04_x-as-a-service/

01_business-benefits-of-xaas.en.srt

9.0 KB

01_business-benefits-of-xaas.en.txt

4.7 KB

01_business-benefits-of-xaas.mp4

15.2 MB

02_a-general-overview-of-xaas_instructions.html

342.6 KB

03_what-is-software-as-a-service.en.srt

6.9 KB

03_what-is-software-as-a-service.en.txt

4.4 KB

03_what-is-software-as-a-service.mp4

16.6 MB

04_saas-in-action_instructions.html

225.6 KB

05_saas-and-xaas-as-a-comparison_instructions.html

513.5 KB

06_iaas-and-paas-as-a-comparison_instructions.html

133.2 KB

07_knowledge-check-x-as-a-service_quiz.html

3.6 KB

08_module-summary-cloud-computing-and-networking.en.srt

8.2 KB

08_module-summary-cloud-computing-and-networking.en.txt

5.3 KB

08_module-summary-cloud-computing-and-networking.mp4

15.3 MB

09_additional-resources-x-as-a-service_instructions.html

2.5 KB

/.../01_final-course-project-and-assessment/

01_course-recap-introduction-to-networking-and-cloud-computing.en.srt

13.5 KB

01_course-recap-introduction-to-networking-and-cloud-computing.en.txt

7.1 KB

01_course-recap-introduction-to-networking-and-cloud-computing.mp4

20.0 MB

02_about-the-final-course-project-and-assessment_instructions.html

7.2 KB

03_final-course-project-digital-transformation_instructions.html

296.2 KB

/.../02_course-wrap-up/

01_congratulations.en.srt

5.2 KB

01_congratulations.en.txt

2.8 KB

01_congratulations.mp4

7.8 MB

02_next-steps_instructions.html

5.4 KB

/Coursera - Microsoft SC-900 Exam Preparation and Practice 2024-1/

Readme.txt

0.1 KB

/.../01_welcome-to-the-course/

01_course-introduction-microsoft-sc-900-exam-preparation-and-practice.en.srt

11.3 KB

01_course-introduction-microsoft-sc-900-exam-preparation-and-practice.en.txt

5.9 KB

01_course-introduction-microsoft-sc-900-exam-preparation-and-practice.mp4

21.3 MB

02_course-syllabus_instructions.html

8.6 KB

03_how-to-be-successful-in-this-course_instructions.html

6.6 KB

04_microsoft-azure-active-directory-name-change_instructions.html

3.4 KB

05_how-to-open-an-image-in-a-new-tab_instructions.html

75.7 KB

06_clean-up-resources_instructions.html

3.2 KB

07_how-to-locate-your-downloaded-files_instructions.html

3.6 KB

08_additional-resources-concepts-of-security-compliance-and-identity_instructions.html

3.0 KB

/.../02_microsoft-certification/

01_introduction-to-preparing-for-the-exam.en.srt

6.9 KB

01_introduction-to-preparing-for-the-exam.en.txt

4.3 KB

01_introduction-to-preparing-for-the-exam.mp4

14.7 MB

02_how-to-prepare-for-the-proctored-examination_instructions.html

427.9 KB

02_how-to-prepare-for-the-proctored-examination_Online-proctored.aspx

104.2 KB

03_topics-covered-in-the-exam-sc-900-microsoft-security-compliance-and-identity_instructions.html

393.5 KB

04_how-the-exam-is-administered_instructions.html

327.1 KB

04_how-the-exam-is-administered_pearsonvue_facility_reqs.aspx

138.4 KB

05_testing-strategy_instructions.html

685.5 KB

06_additional-resources-microsoft-certification_English_as_a_Second_Language_ESL_Request_Form-999930.aspx

164.8 KB

06_additional-resources-microsoft-certification_instructions.html

3.1 KB

06_additional-resources-microsoft-certification_Microsoft.aspx

63.2 KB

06_additional-resources-microsoft-certification_Resources.aspx

92.3 KB

/.../03_security-and-compliance-concepts/

01_overview-of-security-compliance.en.srt

10.0 KB

01_overview-of-security-compliance.en.txt

5.3 KB

01_overview-of-security-compliance.mp4

17.4 MB

02_compliance-concepts_instructions.html

69.6 KB

03_shared-responsibility-model_instructions.html

1.0 MB

04_business-continuity-management.en.srt

9.0 KB

04_business-continuity-management.en.txt

4.9 KB

04_business-continuity-management.mp4

14.8 MB

05_zero-trust-model_instructions.html

715.0 KB

06_zero-trust-model-in-depth.en.srt

10.3 KB

06_zero-trust-model-in-depth.en.txt

5.4 KB

06_zero-trust-model-in-depth.mp4

18.5 MB

07_public-private-key-and-hashing.en.srt

8.9 KB

07_public-private-key-and-hashing.en.txt

5.6 KB

07_public-private-key-and-hashing.mp4

16.3 MB

08_symmetric-and-asymmetric-encryption_instructions.html

405.1 KB

09_encryption-and-hashing_instructions.html

160.4 KB

10_hashing-techniques.en.srt

6.9 KB

10_hashing-techniques.en.txt

4.5 KB

10_hashing-techniques.mp4

15.1 MB

11_encryption-techniques.en.srt

7.7 KB

11_encryption-techniques.en.txt

4.0 KB

11_encryption-techniques.mp4

11.5 MB

12_knowledge-check-security-and-compliance-concepts_quiz.html

4.3 KB

13_additional-resources-security-and-compliance-concepts_instructions.html

2.8 KB

/.../04_identity-concepts/

01_identity-as-the-primary-security-perimeter.en.srt

10.8 KB

01_identity-as-the-primary-security-perimeter.en.txt

5.7 KB

01_identity-as-the-primary-security-perimeter.mp4

18.3 MB

02_authentication_instructions.html

6.0 KB

03_authorization_instructions.html

6.0 KB

04_centralized-access-management.en.srt

8.2 KB

04_centralized-access-management.en.txt

5.2 KB

04_centralized-access-management.mp4

17.4 MB

05_the-benefits-of-centralized-authentication-and-authorization_instructions.html

5.7 KB

06_id-and-active-directory.en.srt

9.0 KB

06_id-and-active-directory.en.txt

5.8 KB

06_id-and-active-directory.mp4

24.6 MB

07_identity-management-and-single-sign-on-sso.en.srt

7.7 KB

07_identity-management-and-single-sign-on-sso.en.txt

4.9 KB

07_identity-management-and-single-sign-on-sso.mp4

18.2 MB

08_identity-providers_instructions.html

6.3 KB

09_federation_instructions.html

94.5 KB

10_group-policies-and-identity-management.en.srt

6.9 KB

10_group-policies-and-identity-management.en.txt

4.4 KB

10_group-policies-and-identity-management.mp4

15.2 MB

11_activity-azure-identity_instructions.html

1.4 MB

12_identity-scope.en.srt

9.8 KB

12_identity-scope.en.txt

5.2 KB

12_identity-scope.mp4

13.5 MB

13_hybrid-identity_instructions.html

1.6 MB

14_knowledge-check-identity-concepts_quiz.html

4.7 KB

15_module-summary-concepts-of-security-compliance-and-identity.en.srt

9.6 KB

15_module-summary-concepts-of-security-compliance-and-identity.en.txt

6.1 KB

15_module-summary-concepts-of-security-compliance-and-identity.mp4

21.2 MB

16_study-checkpoint-concepts-of-security-compliance-and-identity_quiz.html

2.8 KB

17_additional-resources-identity-concepts_instructions.html

4.3 KB

/.../01_authentication-capabilities-of-azure-ad/

01_authentication-methods-in-azure-ad.en.srt

8.2 KB

01_authentication-methods-in-azure-ad.en.txt

5.3 KB

01_authentication-methods-in-azure-ad.mp4

15.7 MB

02_multi-factor-authentication_instructions.html

263.8 KB

03_azure-security.en.srt

8.8 KB

03_azure-security.en.txt

4.7 KB

03_azure-security.mp4

13.1 MB

04_mfa-recovery.en.srt

7.1 KB

04_mfa-recovery.en.txt

4.5 KB

04_mfa-recovery.mp4

15.3 MB

05_self-service-password-reset_instructions.html

240.1 KB

06_password-protection-and-management-capabilities-in-azure-ad_instructions.html

179.1 KB

07_knowledge-check-authentication-capabilities-of-azure-ad_quiz.html

4.5 KB

08_additional-resources-authentication-capabilities-of-azure-ad_instructions.html

4.6 KB

/.../02_access-management-capabilities-of-azure-ad/

01_conditional-access.en.srt

8.3 KB

01_conditional-access.en.txt

5.3 KB

01_conditional-access.mp4

14.8 MB

02_azure-ad-roles.en.srt

8.9 KB

02_azure-ad-roles.en.txt

4.8 KB

02_azure-ad-roles.mp4

12.5 MB

03_azure-ad-role-based-access-control_instructions.html

359.2 KB

04_azure-access-policy-and-management.en.srt

7.5 KB

04_azure-access-policy-and-management.en.txt

4.8 KB

04_azure-access-policy-and-management.mp4

15.8 MB

05_activity-create-a-conditional-policy_instructions.html

6.3 KB

06_knowledge-check-access-management-capabilities-of-azure-ad_quiz.html

4.1 KB

07_additional-resources-access-management-capabilities-of-azure-ad_instructions.html

3.5 KB

/.../03_identity-protection-and-governance-capabilities-of-azure-ad/

01_identity-governance-in-azure-ad.en.srt

10.0 KB

01_identity-governance-in-azure-ad.en.txt

6.4 KB

01_identity-governance-in-azure-ad.mp4

22.4 MB

02_entitlement-management-and-access-reviews_instructions.html

538.7 KB

03_azure-ad-privileged-identity-management-pim_instructions.html

330.2 KB

04_azure-ad-identity-protection.en.srt

11.8 KB

04_azure-ad-identity-protection.en.txt

6.2 KB

04_azure-ad-identity-protection.mp4

20.6 MB

05_best-practices-for-identity-governance_instructions.html

182.5 KB

06_knowledge-check-identity-protection-and-governance-capabilities-of-azure-ad_quiz.html

4.0 KB

07_module-summary-the-capabilities-of-microsoft-azure-active-directory.en.srt

8.7 KB

07_module-summary-the-capabilities-of-microsoft-azure-active-directory.en.txt

5.5 KB

07_module-summary-the-capabilities-of-microsoft-azure-active-directory.mp4

16.5 MB

08_study-checkpoint-the-capabilities-of-microsoft-azure-active-directory_quiz.html

3.7 KB

09_additional-resources-identity-protection-and-governance-capabilities-of-azure-ad_instructions.html

3.8 KB

/.../01_basic-security-capabilities-in-azure/

01_azure-ddos-protection.en.srt

7.6 KB

01_azure-ddos-protection.en.txt

4.8 KB

01_azure-ddos-protection.mp4

14.4 MB

02_ddos-in-depth_instructions.html

508.8 KB

03_azure-firewall.en.srt

10.0 KB

03_azure-firewall.en.txt

5.4 KB

03_azure-firewall.mp4

13.6 MB

04_web-application-firewall_instructions.html

192.1 KB

05_firewalls-in-depth.en.srt

8.3 KB

05_firewalls-in-depth.en.txt

5.2 KB

05_firewalls-in-depth.mp4

16.8 MB

06_network-segmentation-with-azure-virtual-networks_instructions.html

221.4 KB

07_azure-network-security-groups_instructions.html

77.2 KB

08_activity-network-segmentation-and-firewalls_instructions.html

7.5 KB

09_azure-bastion-and-jit-access.en.srt

7.7 KB

09_azure-bastion-and-jit-access.en.txt

4.9 KB

09_azure-bastion-and-jit-access.mp4

12.7 MB

10_activity-securing-resources-with-jit_instructions.html

634.8 KB

11_azure-and-data-encryption_instructions.html

8.3 KB

12_knowledge-check-basic-security-capabilities-in-azure_quiz.html

4.3 KB

13_additional-resources-basic-security-capabilities-in-azure_instructions.html

5.1 KB

/.../02_azure-security-management/

01_cloud-security-posture-management-cspm.en.srt

8.6 KB

01_cloud-security-posture-management-cspm.en.txt

4.6 KB

01_cloud-security-posture-management-cspm.mp4

15.1 MB

02_cloud-security-posture-management-cspm-in-depth_instructions.html

8.7 KB

03_microsoft-defender-for-cloud.en.srt

9.4 KB

03_microsoft-defender-for-cloud.en.txt

5.0 KB

03_microsoft-defender-for-cloud.mp4

13.9 MB

04_defender-for-cloud-enhanced-security-features_instructions.html

399.2 KB

05_defender-for-cloud-in-depth.en.srt

9.3 KB

05_defender-for-cloud-in-depth.en.txt

5.0 KB

05_defender-for-cloud-in-depth.mp4

11.1 MB

06_security-baselines-for-azure.en.srt

9.2 KB

06_security-baselines-for-azure.en.txt

5.9 KB

06_security-baselines-for-azure.mp4

20.4 MB

07_knowledge-check-azure-security-management_quiz.html

4.3 KB

08_additional-resources-azure-security-management_instructions.html

3.1 KB

/.../03_security-capabilities-of-microsoft-sentinel/

01_siem-and-soar.en.srt

8.7 KB

01_siem-and-soar.en.txt

4.6 KB

01_siem-and-soar.mp4

17.3 MB

02_microsoft-sentinel.en.srt

10.1 KB

02_microsoft-sentinel.en.txt

5.4 KB

02_microsoft-sentinel.mp4

18.4 MB

03_sentinel-and-integrated-threat-management_instructions.html

334.6 KB

04_sentinel-in-depth.en.srt

8.9 KB

04_sentinel-in-depth.en.txt

4.7 KB

04_sentinel-in-depth.mp4

17.3 MB

05_knowledge-check-security-capabilities-of-microsoft-sentinel_quiz.html

3.7 KB

06_additional-resources-security-capabilities-of-microsoft-sentinel_instructions.html

4.1 KB

/.../04_threat-protection-with-microsoft-365-defender/

01_microsoft-365-defender-services.en.srt

9.7 KB

01_microsoft-365-defender-services.en.txt

5.2 KB

01_microsoft-365-defender-services.mp4

14.2 MB

02_defender-for-office-365_instructions.html

236.3 KB

03_defender-for-endpoint.en.srt

10.5 KB

03_defender-for-endpoint.en.txt

5.5 KB

03_defender-for-endpoint.mp4

14.5 MB

04_defender-for-cloud-apps_instructions.html

7.7 KB

05_defender-for-identity.en.srt

10.4 KB

05_defender-for-identity.en.txt

5.6 KB

05_defender-for-identity.mp4

14.9 MB

06_microsoft-365-defender-portal.en.srt

8.1 KB

06_microsoft-365-defender-portal.en.txt

5.2 KB

06_microsoft-365-defender-portal.mp4

15.0 MB

07_defender-365-in-depth_instructions.html

8.1 KB

08_knowledge-check-threat-protection-with-microsoft-365-defender_quiz.html

4.1 KB

09_module-summary-microsoft-security-solutions.en.srt

11.8 KB

09_module-summary-microsoft-security-solutions.en.txt

7.6 KB

09_module-summary-microsoft-security-solutions.mp4

16.9 MB

10_study-checkpoint-microsoft-security-solutions_quiz.html

3.8 KB

11_additional-resources-threat-protection-with-microsoft-365-defender_instructions.html

4.6 KB

/.../01_microsofts-service-trust-portal-and-privacy-principles/

01_capabilities-of-service-trust-portal.en.srt

11.9 KB

01_capabilities-of-service-trust-portal.en.txt

6.3 KB

01_capabilities-of-service-trust-portal.mp4

15.6 MB

02_microsofts-privacy-principles_instructions.html

109.2 KB

03_customer-privacy_instructions.html

229.5 KB

04_trust-and-privacy.en.srt

11.5 KB

04_trust-and-privacy.en.txt

6.0 KB

04_trust-and-privacy.mp4

15.7 MB

05_knowledge-check-microsofts-service-trust-portal-and-privacy-principles_quiz.html

4.2 KB

06_additional-resources-microsofts-service-trust-portal-and-privacy-principles_instructions.html

4.2 KB

/.../02_compliance-management-capabilities-of-microsoft-purview/

01_microsoft-purview-compliance-portal.en.srt

9.7 KB

01_microsoft-purview-compliance-portal.en.txt

5.3 KB

01_microsoft-purview-compliance-portal.mp4

18.6 MB

02_compliance-manager.en.srt

9.5 KB

02_compliance-manager.en.txt

5.1 KB

02_compliance-manager.mp4

16.5 MB

03_microsoft-purview_instructions.html

98.4 KB

04_benefits-of-compliance-score_instructions.html

1.6 MB

05_purview-and-compliance.en.srt

13.0 KB

05_purview-and-compliance.en.txt

6.8 KB

05_purview-and-compliance.mp4

22.2 MB

06_knowledge-check-compliance-management-capabilities-of-microsoft-purview_quiz.html

4.1 KB

07_additional-resources-compliance-management-capabilities-of-microsoft-purview_instructions.html

3.6 KB

/.../03_information-protection-and-data-lifecycle-management-capabilities-of-microsoft/

01_data-classification-capabilities.en.srt

7.6 KB

01_data-classification-capabilities.en.txt

4.9 KB

01_data-classification-capabilities.mp4

17.2 MB

02_benefits-of-content-explorer-and-activity-explorer.en.srt

9.3 KB

02_benefits-of-content-explorer-and-activity-explorer.en.txt

4.9 KB

02_benefits-of-content-explorer-and-activity-explorer.mp4

13.6 MB

03_sensitivity-labels_instructions.html

79.4 KB

04_records-management_instructions.html

49.4 KB

05_retention-polices-and-retention-labels_instructions.html

10.0 KB

06_purview-policies-data-and-labels.en.srt

7.5 KB

06_purview-policies-data-and-labels.en.txt

4.8 KB

06_purview-policies-data-and-labels.mp4

15.2 MB

07_purview-data-lifecycle.en.srt

9.7 KB

07_purview-data-lifecycle.en.txt

5.0 KB

07_purview-data-lifecycle.mp4

17.2 MB

08_knowledge-check-information-protection-and-data-lifecycle-management_quiz.html

4.4 KB

09_module-summary-capabilities-of-microsoft-compliance-solutions.en.srt

10.2 KB

09_module-summary-capabilities-of-microsoft-compliance-solutions.en.txt

6.6 KB

09_module-summary-capabilities-of-microsoft-compliance-solutions.mp4

23.3 MB

10_study-checkpoint-capabilities-of-microsoft-compliance-solutions_quiz.html

3.5 KB

11_additional-resources-information-protection-and-data-lifecycle-management_instructions.html

3.7 KB

/.../01_describe-insider-risk-capabilities-in-microsoft-purview/

01_insider-risk-management.en.srt

12.2 KB

01_insider-risk-management.en.txt

6.4 KB

01_insider-risk-management.mp4

15.6 MB

02_communication-compliance_instructions.html

51.6 KB

03_information-barriers.en.srt

8.7 KB

03_information-barriers.en.txt

5.5 KB

03_information-barriers.mp4

16.7 MB

04_information-management.en.srt

9.1 KB

04_information-management.en.txt

5.9 KB

04_information-management.mp4

17.1 MB

05_information-management-and-compliance_instructions.html

8.5 KB

06_activity-threat-response_instructions.html

1.7 MB

07_knowledge-check-insider-risk-capabilities-in-microsoft-purview_quiz.html

4.8 KB

08_additional-resources-insider-risk-capabilities-in-microsoft-purview_instructions.html

5.3 KB

/.../02_resource-governance-capabilities-in-azure/

01_azure-policy.en.srt

7.9 KB

01_azure-policy.en.txt

5.1 KB

01_azure-policy.mp4

13.3 MB

02_azure-blueprints.en.srt

9.3 KB

02_azure-blueprints.en.txt

5.1 KB

02_azure-blueprints.mp4

12.1 MB

03_microsoft-purview-unified-data-governance-solution_instructions.html

1.7 MB

04_resources-and-compliance.en.srt

10.1 KB

04_resources-and-compliance.en.txt

5.5 KB

04_resources-and-compliance.mp4

12.9 MB

05_knowledge-check-resource-governance-capabilities-in-azure_quiz.html

3.8 KB

06_module-summary-risk-and-resource-governance.en.srt

8.9 KB

06_module-summary-risk-and-resource-governance.en.txt

5.8 KB

06_module-summary-risk-and-resource-governance.mp4

14.4 MB

07_study-checkpoint-risk-and-resource-governance_quiz.html

3.4 KB

08_additional-resources-resource-governance-capabilities-in-azure_instructions.html

3.8 KB

/.../01_sc-900-practice-exam/

01_introduction-to-the-sc-900-exam.en.srt

11.0 KB

01_introduction-to-the-sc-900-exam.en.txt

5.9 KB

01_introduction-to-the-sc-900-exam.mp4

18.2 MB

02_preparing-for-the-exam_instructions.html

5.5 KB

02_preparing-for-the-exam_Online-proctored.aspx

104.2 KB

03_practice-assessment-sc-900-microsoft-security-compliance-and-identity_instructions.html

4.6 KB

04_sign-up-for-the-proctored-exam_dashboard.aspx

1.0 KB

04_sign-up-for-the-proctored-exam_instructions.html

10.2 KB

/.../02_course-wrap-up/

01_congratulations.en.srt

7.7 KB

01_congratulations.en.txt

5.0 KB

01_congratulations.mp4

11.9 MB

02_a-day-in-the-life.en.srt

9.1 KB

02_a-day-in-the-life.en.txt

5.8 KB

02_a-day-in-the-life.mp4

14.8 MB

03_career-opportunities-through-learning_instructions.html

5.8 KB

04_next-steps_instructions.html

5.4 KB

 

Total files 1807


Copyright © 2025 FileMood.com