SEC511 Continuous Monitoring and Security Operations |
||
Name |
DOWNLOAD Copy Link | |
Total Size |
24.1 GB |
|
Total Files |
972 |
|
Last Seen |
2025-02-19 23:53 |
|
Hash |
801551349D5128E4D81696D098B7A6F27B40934D |
/MP3 2020/ |
|
|
73.3 MB |
|
70.0 MB |
|
61.4 MB |
|
114.1 MB |
|
84.7 MB |
|
76.4 MB |
|
76.3 MB |
|
110.0 MB |
|
80.3 MB |
|
75.9 MB |
|
55.7 MB |
|
123.3 MB |
|
84.4 MB |
|
81.7 MB |
|
50.6 MB |
|
107.8 MB |
|
83.8 MB |
|
52.0 MB |
|
60.8 MB |
|
140.0 MB |
|
47.4 MB |
/PDF 2020/ |
|
|
44.4 MB |
/USB 2020/ |
|
|
14.8 GB |
/.../1. Current State Assessment SOCs and Security Architecture/1. Course Overview/ |
|
1. Current State Assessment SOCs and Security Architecture.mp4 |
117.9 MB |
|
1.4 MB |
|
64.9 KB |
|
60.0 MB |
|
91.7 KB |
|
4.0 MB |
|
2.6 MB |
|
1.9 MB |
|
3.8 MB |
|
1.4 MB |
|
1.5 MB |
|
6.3 MB |
|
4.3 MB |
|
10.9 MB |
|
525.8 KB |
|
4.6 MB |
|
407.1 KB |
|
3.7 MB |
|
9.5 MB |
|
173.7 MB |
|
71.9 KB |
|
79.2 KB |
|
138.6 KB |
24. SEC511 Workbook Initial Configuration and Connection.mp4 |
241.9 MB |
/.../2. Current State Assessment/ |
|
|
694.5 KB |
|
2.0 MB |
|
626.3 KB |
|
7.9 MB |
|
9.9 MB |
|
1.6 MB |
|
10.1 MB |
|
6.1 MB |
|
14.4 MB |
|
2.5 MB |
|
6.0 MB |
|
7.4 MB |
|
11.4 MB |
|
13.7 MB |
|
112.0 KB |
/.../1. Current State Assessment SOCs and Security Architecture/3. Adversarial Dominance/ |
|
|
1.2 MB |
|
3.2 MB |
|
1.3 MB |
|
13.7 MB |
|
2.2 MB |
|
2.5 MB |
/.../4. Traditional Attack Techniques/ |
|
|
1.8 MB |
|
1.4 MB |
|
2.3 MB |
|
8.5 MB |
|
4.3 MB |
|
4.3 MB |
|
2.4 MB |
|
4.2 MB |
|
992.6 KB |
|
10.2 MB |
|
6.9 MB |
|
742.4 KB |
/.../5. Traditional Cyber Defense/ |
|
|
566.7 KB |
|
1.5 MB |
|
1.7 MB |
|
1.5 MB |
|
2.6 MB |
|
7.4 MB |
|
4.6 MB |
|
6.5 MB |
|
2.8 MB |
|
140.2 KB |
|
116.0 KB |
|
181.5 MB |
|
111.4 KB |
|
133.5 KB |
|
138.2 KB |
16. SEC511 Workbook Detecting Traditional Attack Techniques.mp4 |
157.1 MB |
/.../6. Modern Attack Techniques/ |
|
|
594.0 KB |
|
5.4 MB |
|
6.8 MB |
|
5.4 MB |
|
3.3 MB |
|
6.9 MB |
|
2.1 MB |
|
2.5 MB |
|
2.9 MB |
/.../7. ClientSide Attack Vectors/ |
|
|
141.4 KB |
|
1.0 MB |
|
10.0 MB |
|
1.6 MB |
|
8.0 MB |
|
9.0 MB |
|
2.7 MB |
|
14.1 MB |
|
8.5 MB |
|
7.3 MB |
|
7.8 MB |
|
2.3 MB |
|
7.5 MB |
|
1.0 MB |
/.../1. Current State Assessment SOCs and Security Architecture/8. ClientSide Targets/ |
|
|
1.1 MB |
|
1.2 MB |
|
1.6 MB |
|
3.7 MB |
|
4.0 MB |
|
3.1 MB |
|
6.2 MB |
|
1.1 MB |
|
3.2 MB |
/.../1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/ |
|
|
2.2 MB |
|
1.6 MB |
|
886.6 KB |
|
1.7 MB |
|
1.3 MB |
|
6.3 MB |
|
3.3 MB |
|
973.9 KB |
|
4.2 MB |
|
7.0 MB |
|
1.5 MB |
|
3.8 MB |
|
5.7 MB |
|
1.7 MB |
|
7.4 MB |
|
2.7 MB |
/.../10. Modern Cyber Defense Principles/ |
|
|
1.4 MB |
|
269.9 KB |
|
5.1 MB |
|
1.2 MB |
|
4.7 MB |
|
3.1 MB |
|
6.6 MB |
|
2.7 MB |
|
1.9 MB |
|
2.8 MB |
|
143.1 KB |
|
63.6 MB |
/.../11. Adversary Informed Detection/ |
|
|
2.0 MB |
|
1.4 MB |
|
3.0 MB |
|
1.2 MB |
|
6.1 MB |
|
7.3 MB |
|
1.2 MB |
|
2.9 MB |
|
5.7 MB |
|
7.4 MB |
|
7.8 MB |
|
1.6 MB |
|
2.5 MB |
|
7.7 MB |
|
1.3 MB |
|
3.0 MB |
|
6.2 MB |
|
2.3 MB |
/.../12. Security Operations Centers/ |
|
|
451.6 KB |
|
1.4 MB |
|
1.7 MB |
|
1.2 MB |
|
3.3 MB |
|
5.7 MB |
|
10.5 MB |
|
3.7 MB |
|
3.3 MB |
|
5.6 MB |
|
8.4 MB |
|
7.6 MB |
|
2.4 MB |
|
1.9 MB |
|
4.1 MB |
|
1.4 MB |
|
1.5 MB |
|
3.4 MB |
|
5.1 MB |
|
1.3 MB |
|
2.3 MB |
/.../13. Section One Summary/ |
|
|
123.6 KB |
|
101.9 KB |
|
116.6 KB |
|
45.3 MB |
|
132.6 MB |
|
57.3 KB |
/.../1. Network Security Architecture/ |
|
|
21.4 MB |
|
36.8 MB |
|
31.2 MB |
|
573.4 KB |
|
4.5 MB |
|
7.3 MB |
|
9.9 MB |
|
10.3 MB |
|
9.3 MB |
|
2.6 MB |
|
4.2 MB |
|
1.5 MB |
|
484.4 KB |
|
136.9 KB |
|
1.5 MB |
|
911.4 KB |
|
1.1 MB |
|
1.3 MB |
|
3.2 MB |
|
1.3 MB |
|
877.2 KB |
|
130.5 KB |
|
999.9 KB |
|
3.0 MB |
|
1.9 MB |
|
285.8 KB |
|
1.6 MB |
|
1.9 MB |
|
1.8 MB |
|
118.6 KB |
|
2.5 MB |
/.../2. Network Security Architecture/2. Routers/ |
|
|
862.1 KB |
|
1.8 MB |
|
11.4 MB |
|
3.4 MB |
|
12.6 MB |
|
1.1 MB |
|
4.6 MB |
|
8.9 MB |
|
22.4 MB |
|
5.6 MB |
|
1.3 MB |
|
908.2 KB |
|
1.0 MB |
|
2.3 MB |
|
811.2 KB |
/.../3. Perimeter SI Firewalls/ |
|
|
8.8 MB |
|
1.1 MB |
|
3.6 MB |
|
10.0 MB |
|
11.6 MB |
|
2.5 MB |
|
2.1 MB |
|
20.2 MB |
|
2.5 MB |
|
133.1 KB |
|
7.1 MB |
|
3.2 MB |
/.../4. Web Application Firewalls/ |
|
|
1.6 MB |
|
3.9 MB |
|
5.0 MB |
|
7.4 MB |
|
7.8 MB |
|
11.7 MB |
|
2.7 MB |
|
3.4 MB |
|
323.3 KB |
|
125.7 KB |
|
54.1 MB |
/.../2. Network Security Architecture/5. Forward Proxies/ |
|
|
1.9 MB |
|
3.3 MB |
|
6.3 MB |
|
6.5 MB |
|
2.8 MB |
|
4.1 MB |
|
11.4 MB |
|
15.1 MB |
|
1.8 MB |
|
1.4 MB |
|
10.4 MB |
|
3.1 MB |
|
1.3 MB |
/.../6. Encryption and TLS Inspection/ |
|
|
122.3 KB |
|
3.7 MB |
|
8.5 MB |
|
4.2 MB |
|
5.6 MB |
|
5.3 MB |
|
6.8 MB |
|
10.0 MB |
|
8.1 MB |
|
14.7 MB |
/.../7. Network Intrusion Detection Systems/ |
|
|
636.8 KB |
|
2.0 MB |
|
4.8 MB |
|
6.8 MB |
|
11.2 MB |
|
1.1 MB |
|
5.1 MB |
|
958.2 KB |
|
3.6 MB |
|
5.3 MB |
|
3.3 MB |
|
6.4 MB |
/.../8. Network Intrusion Prevention Systems/ |
|
|
125.8 KB |
|
5.1 MB |
|
8.4 MB |
|
1.3 MB |
|
763.9 KB |
|
696.3 KB |
/.../2. Network Security Architecture/9. NextGeneration Firewalls/ |
|
|
560.5 KB |
|
1.2 MB |
|
3.2 MB |
|
3.6 MB |
|
17.8 MB |
|
3.9 MB |
|
7.2 MB |
|
2.0 MB |
|
806.0 KB |
|
2.9 MB |
|
1.6 MB |
|
600.8 KB |
13. SEC511 Workbook Application Detection and Control with Snort OpenAppId.mp4 |
51.2 MB |
/.../10. Malware Detonation Devices/ |
|
|
5.1 MB |
|
14.5 MB |
|
7.9 MB |
|
4.5 MB |
|
2.4 MB |
6. Malware Detonation vs Scenario 2 Client PreventionDetection.mp4 |
8.1 MB |
/.../11. Entropy and freqpy/ |
|
|
161.0 KB |
|
3.4 MB |
|
5.5 MB |
|
2.2 MB |
|
8.2 MB |
|
7.6 MB |
|
14.3 MB |
|
2.8 MB |
|
1.9 MB |
|
17.7 MB |
|
6.6 MB |
|
2.7 MB |
|
7.6 MB |
/.../12. Security Information and Event Management SIEM/ |
|
|
471.7 KB |
|
7.3 MB |
|
3.1 MB |
|
3.0 MB |
|
3.1 MB |
|
11.6 MB |
|
5.2 MB |
|
308.7 KB |
|
3.1 MB |
/.../13. Adversary Deception Devices/ |
|
|
3.3 MB |
|
2.2 MB |
|
1.2 MB |
|
3.8 MB |
|
7.6 MB |
|
2.2 MB |
|
7.3 MB |
/.../14. SwitchesPVLAN Security/ |
|
|
2.1 MB |
|
4.5 MB |
|
146.1 KB |
|
4.9 MB |
5. CIS 143 Disable WorkstationtoWorkstation Communication.mp4 |
1.7 MB |
|
4.0 MB |
|
4.1 MB |
|
982.6 KB |
|
4.2 MB |
/.../15. Threat Intelligence/ |
|
|
812.7 KB |
|
4.6 MB |
|
2.3 MB |
|
3.0 MB |
|
3.9 MB |
|
11.1 MB |
|
1.0 MB |
|
2.0 MB |
|
2.0 MB |
|
1.4 MB |
|
651.7 KB |
|
1.0 MB |
|
3.1 MB |
/.../16. Section Two Summary/ |
|
|
8.7 MB |
|
49.8 MB |
|
22.4 MB |
|
123.5 KB |
|
140.7 MB |
|
57.4 KB |
/.../3. Network Security Monitoring/1. Getting Started/ |
|
|
1.9 MB |
|
7.2 MB |
|
24.9 MB |
|
121.7 KB |
|
3.5 MB |
/.../2. Network Security Monitoring Overview/ |
|
|
167.2 KB |
|
4.0 MB |
|
7.5 MB |
|
2.2 MB |
5. Its More Complicated than Threats versus Vulnerabilities.mp4 |
3.1 MB |
|
6.1 MB |
|
15.9 MB |
|
4.5 MB |
/.../3. Evolution of NSM/ |
|
|
492.9 KB |
|
2.2 MB |
|
2.9 MB |
|
1.6 MB |
|
2.2 MB |
|
6.7 MB |
7. Bejtlich South Carolina Department of Revenue DoR Case Study.mp4 |
4.9 MB |
|
3.2 MB |
|
1.8 MB |
|
1.3 MB |
|
1.4 MB |
|
3.2 MB |
/.../4. The NSM Toolbox/ |
|
|
165.8 KB |
|
981.2 KB |
|
4.3 MB |
|
2.0 MB |
|
5.2 MB |
|
2.6 MB |
|
5.8 MB |
|
7.9 MB |
|
11.8 MB |
|
4.3 MB |
|
14.2 MB |
|
6.3 MB |
|
531.6 KB |
|
2.4 MB |
|
1.6 MB |
|
1.2 MB |
17. Example Difference between SnortSuricata and ZeekBro.mp4 |
19.7 MB |
|
2.8 MB |
/.../3. Network Security Monitoring/5. NIDS Design/ |
|
|
1.3 MB |
|
1.6 MB |
|
3.5 MB |
|
5.2 MB |
|
1.5 MB |
|
1.9 MB |
|
167.5 KB |
|
7.4 MB |
|
8.1 MB |
|
998.2 KB |
|
2.4 MB |
|
7.1 MB |
|
898.0 KB |
/.../3. Network Security Monitoring/6. Analysis Methodology/ |
|
|
5.0 MB |
|
5.7 MB |
|
2.0 MB |
|
6.4 MB |
|
1.5 MB |
|
1.6 MB |
/.../7. NSM Data Sources/ |
|
|
165.6 KB |
|
2.0 MB |
|
476.2 KB |
|
3.2 MB |
|
2.8 MB |
|
1.8 MB |
|
2.3 MB |
|
6.2 MB |
9. Carving Files with Wireshark Step 1 Identify the File.mp4 |
4.2 MB |
|
1.5 MB |
|
2.3 MB |
12. Save the EXE Check the File Type Hash and Scan with Antivirus.mp4 |
3.9 MB |
|
4.2 MB |
|
2.9 MB |
|
4.8 MB |
|
3.1 MB |
|
1.9 MB |
|
1.5 MB |
|
8.5 MB |
|
600.7 KB |
|
1.3 MB |
|
2.8 MB |
|
1.6 MB |
|
2.2 MB |
|
482.2 KB |
|
1.0 MB |
|
474.2 KB |
28. SEC511 Workbook Pcap Strings and File Carving ZeekBro.mp4 |
182.7 MB |
/.../8. Practical NSM Issues/ |
|
|
510.9 KB |
|
878.5 KB |
|
2.2 MB |
|
6.5 MB |
|
1.2 MB |
|
3.1 MB |
|
8.0 MB |
|
5.3 MB |
|
1.7 MB |
|
1.9 MB |
|
68.0 KB |
|
3.8 MB |
|
9.3 MB |
|
4.2 MB |
15. Practical Issues Time Zones and Daylight Saving Time.mp4 |
4.2 MB |
16. Spring Time Difference Between NYC London and Sydney 1.mp4 |
117.0 KB |
/.../3. Network Security Monitoring/9. Cornerstone NSM/ |
|
|
798.6 KB |
|
371.8 KB |
|
1.4 MB |
|
459.6 KB |
|
2.6 MB |
|
987.2 KB |
|
775.8 KB |
|
144.1 MB |
/.../10. Tracking EXEs/ |
|
|
2.2 MB |
|
2.1 MB |
|
1.1 MB |
|
3.8 MB |
|
2.1 MB |
|
4.4 MB |
|
3.1 MB |
|
7.3 MB |
|
665.6 KB |
|
1.2 MB |
|
2.8 MB |
|
1.3 MB |
|
3.7 MB |
|
1.2 MB |
|
550.8 KB |
|
681.7 KB |
|
7.4 MB |
/.../11. Identifying Command and Control Traffic/ |
|
|
774.6 KB |
|
3.4 MB |
|
6.4 MB |
|
3.1 MB |
|
4.1 MB |
|
2.1 MB |
|
3.1 MB |
|
3.8 MB |
|
2.0 MB |
|
481.6 KB |
|
2.6 MB |
|
14.0 MB |
|
5.1 MB |
|
4.8 MB |
|
6.6 MB |
|
4.3 MB |
|
15.0 MB |
|
1.7 MB |
|
1.1 MB |
|
1.2 MB |
|
2.8 MB |
|
7.4 MB |
|
1.1 MB |
|
2.6 MB |
|
3.3 MB |
|
3.4 MB |
/.../12. Tracking User Agents/ |
|
|
746.3 KB |
|
2.8 MB |
|
2.4 MB |
|
3.0 MB |
|
3.4 MB |
|
3.3 MB |
7. Our Approach on the Contagio Crimeware Pcap Collection.mp4 |
7.2 MB |
|
2.4 MB |
/.../13. C2 via HTTPS/ |
|
|
841.3 KB |
|
760.7 KB |
|
2.4 MB |
|
1.8 MB |
|
3.0 MB |
|
1.7 MB |
|
3.0 MB |
|
1.0 MB |
|
3.0 MB |
|
1.6 MB |
|
965.2 KB |
/.../14. Tracking Encryption Certificates/ |
|
|
1.0 MB |
|
1.9 MB |
|
1.4 MB |
|
3.5 MB |
|
1.8 MB |
|
1.1 MB |
|
8.4 MB |
8. A Simple Approach to Detecting Malware via Certificates.mp4 |
4.1 MB |
9. Our Approach on the Contagio Crimeware Pcap Collection.mp4 |
283.4 KB |
/.../15. SectionThree Summary/ |
|
|
120.4 KB |
|
41.3 MB |
|
69.4 MB |
|
57.5 KB |
|
73.7 KB |
/.../1. Endpoint Security Architecture Overview/ |
|
|
22.6 MB |
|
66.3 MB |
|
78.3 KB |
|
144.3 KB |
|
4.5 MB |
|
5.9 MB |
|
4.2 MB |
/.../4. Endpoint Security Architecture/2. Windows Endpoints/ |
|
|
141.8 KB |
|
620.1 KB |
|
6.6 MB |
|
8.2 MB |
|
2.3 MB |
/.../4. Endpoint Security Architecture/3. Patching/ |
|
|
598.1 KB |
|
3.2 MB |
|
20.5 MB |
|
5.2 MB |
|
5.7 MB |
|
3.0 MB |
|
2.3 MB |
/.../4. Secure Baseline Configuration/ |
|
|
139.6 KB |
|
2.9 MB |
|
8.4 MB |
|
4.9 MB |
|
4.9 MB |
|
1.6 MB |
|
4.0 MB |
|
3.9 MB |
|
1.6 MB |
|
1.0 MB |
|
2.5 MB |
|
1.3 MB |
|
3.3 MB |
|
8.8 MB |
/.../5. EMET and Windows Defender Exploit Guard/ |
|
|
709.5 KB |
|
963.9 KB |
|
9.2 MB |
|
6.1 MB |
|
3.8 MB |
|
5.8 MB |
|
1.9 MB |
8. Windows Defender Technologies in a Table Part 1 from Minerva Labs 1.mp4 |
11.6 MB |
9. Windows Defender Technologies in a Table Part 2 from Minerva Labs 1.mp4 |
1.9 MB |
/.../6. Application Monitoring and Sysmon/ |
|
|
3.1 MB |
|
1.5 MB |
|
7.4 MB |
|
8.8 MB |
|
2.6 MB |
|
18.6 MB |
|
899.4 KB |
|
1.2 MB |
|
6.5 MB |
|
9.3 MB |
|
2.9 MB |
|
19.6 MB |
|
8.5 MB |
|
4.2 MB |
|
2.1 MB |
16. Detecting Unusual and Unsigned Drivers and Images with Sysmon.mp4 |
6.4 MB |
|
8.8 MB |
|
4.3 MB |
|
148.9 KB |
|
146.1 MB |
/.../4. Endpoint Security Architecture/7. Application Whitelisting/ |
|
|
1.4 MB |
|
772.5 KB |
|
685.6 KB |
|
5.1 MB |
|
13.0 MB |
|
2.2 MB |
|
1.4 MB |
|
1.9 MB |
|
1.4 MB |
|
13.3 MB |
|
1.3 MB |
|
5.5 MB |
|
568.7 KB |
|
2.9 MB |
|
5.3 MB |
|
2.7 MB |
|
3.0 MB |
18. NIST Special Publication 800167 Guide to Application Whitelisting.mp4 |
1.2 MB |
|
3.0 MB |
|
4.6 MB |
|
2.8 MB |
|
1.2 MB |
|
2.7 MB |
|
4.2 MB |
|
1.1 MB |
|
3.5 MB |
|
2.8 MB |
28. Arent advanced attackers moving towards code and DLL injection.mp4 |
1.6 MB |
|
1.0 MB |
|
1.1 MB |
|
2.4 MB |
|
1.5 MB |
|
4.0 MB |
|
567.9 KB |
|
293.5 KB |
/.../4. Endpoint Security Architecture/8. Administrative Accounts/ |
|
|
3.9 MB |
|
3.8 MB |
|
2.4 MB |
|
287.3 KB |
|
1.7 MB |
|
4.3 MB |
|
4.4 MB |
|
2.7 MB |
|
12.2 MB |
|
3.9 MB |
|
10.4 MB |
|
11.7 MB |
|
4.1 MB |
/.../4. Endpoint Security Architecture/9. Privilege Monitoring/ |
|
|
528.1 KB |
|
2.5 MB |
|
2.0 MB |
|
3.9 MB |
|
5.7 MB |
|
2.4 MB |
|
11.9 MB |
|
4.5 MB |
|
2.4 MB |
|
2.0 MB |
|
137.7 KB |
|
109.0 MB |
/.../10. Privilege Reduction/ |
|
|
2.3 MB |
|
6.0 MB |
|
4.9 MB |
|
4.8 MB |
|
857.1 KB |
|
4.9 MB |
|
6.3 MB |
|
1.5 MB |
|
1.0 MB |
|
12.5 MB |
|
633.7 KB |
|
3.6 MB |
|
1.2 MB |
/.../4. Endpoint Security Architecture/11. Authentication/ |
|
|
4.2 MB |
|
1.5 MB |
|
1.4 MB |
|
7.7 MB |
|
1.5 MB |
|
9.9 MB |
|
9.0 MB |
|
12.6 MB |
|
2.8 MB |
|
5.5 MB |
|
6.1 MB |
/.../12. Security Support Provider/ |
|
|
681.9 KB |
|
4.9 MB |
|
4.0 MB |
|
3.9 MB |
|
850.3 KB |
|
1.5 MB |
|
12.9 MB |
|
667.4 KB |
|
4.0 MB |
/.../4. Endpoint Security Architecture/13. PostAuthentication/ |
|
|
685.5 KB |
|
2.6 MB |
|
3.6 MB |
|
4.5 MB |
|
1.3 MB |
|
616.2 KB |
|
5.3 MB |
/.../14. Advanced Authentication Attacks/ |
|
|
554.0 KB |
|
8.6 MB |
|
4.0 MB |
|
3.7 MB |
|
1.8 MB |
|
6.3 MB |
|
926.0 KB |
|
777.0 KB |
9. Announcing Mimiyakz The Sed Persistent Threat SPT Strikes Again.mp4 |
2.7 MB |
|
18.8 MB |
|
3.9 MB |
/.../15. Endpoint Protection Platforms EPP/ |
|
|
2.1 MB |
|
15.3 MB |
|
3.3 MB |
|
196.6 KB |
|
5.0 MB |
|
1.2 MB |
|
2.7 MB |
|
142.3 KB |
|
1.3 MB |
|
3.8 MB |
|
1.5 MB |
|
2.1 MB |
|
4.8 MB |
14. ASD Mitigation Strategy Endpoint Detection and Response.mp4 |
2.3 MB |
|
10.4 MB |
|
2.3 MB |
/.../16. Section 4 Summary/ |
|
|
43.2 MB |
|
115.7 KB |
|
117.2 KB |
|
148.0 KB |
|
55.3 MB |
|
57.7 KB |
/.../1. Continuous Security Monitoring Overview/ |
|
|
17.7 MB |
|
55.3 MB |
|
80.8 KB |
|
135.8 KB |
|
3.3 MB |
|
3.0 MB |
|
1.1 MB |
|
10.4 MB |
|
7.4 MB |
|
11.2 MB |
|
726.2 KB |
|
834.0 KB |
|
1.1 MB |
|
18.4 MB |
|
625.0 KB |
16. Spotting the Adversary with Windows Event Log Monitoring Version 2.mp4 |
3.7 MB |
|
2.9 MB |
|
1.5 MB |
/.../2. Industry Best Practices/ |
|
|
589.4 KB |
|
4.2 MB |
|
3.4 MB |
|
2.3 MB |
|
10.5 MB |
6. ASD Essential Eight Prevent Malware Delivery and Execution.mp4 |
8.9 MB |
|
737.1 KB |
8. ASD Essential Eight Recover Data and System Availability.mp4 |
2.5 MB |
|
2.3 MB |
|
15.4 MB |
/.../3. Winning CSM Techniques/ |
|
|
576.4 KB |
|
446.2 KB |
|
12.2 MB |
|
7.4 MB |
|
1.1 MB |
|
3.5 MB |
|
5.9 MB |
|
2.2 MB |
|
9.9 MB |
|
938.2 KB |
|
3.9 MB |
|
6.8 MB |
|
2.4 MB |
|
2.5 MB |
|
19.4 MB |
16. Lets Try Long Tail Analysis on Windows Security Logs.mp4 |
53.3 MB |
|
74.1 KB |
/.../4. Maintaining Situational Awareness/ |
|
|
139.0 KB |
|
10.3 MB |
|
1.3 MB |
/.../5. Host and Service Discovery/ |
|
|
1.2 MB |
|
1.7 MB |
|
2.0 MB |
|
486.6 KB |
|
2.3 MB |
|
1.8 MB |
|
1.9 MB |
|
766.0 KB |
|
10.7 MB |
|
1.3 MB |
|
2.7 MB |
|
139.2 KB |
|
29.1 MB |
/.../6. Passive OS Detection/ |
|
|
6.3 MB |
|
12.2 MB |
|
4.8 MB |
|
6.6 MB |
|
3.8 MB |
|
826.3 KB |
|
466.1 KB |
|
1.7 MB |
|
122.4 KB |
|
32.5 MB |
/.../5. Automation and Continuous Security Monitoring/7. Vulnerability Scanning/ |
|
|
137.5 KB |
|
4.9 MB |
|
4.6 MB |
|
3.2 MB |
|
3.4 MB |
|
6.3 MB |
/.../5. Automation and Continuous Security Monitoring/8. Monitoring Patching/ |
|
|
2.7 MB |
|
909.5 KB |
|
3.6 MB |
|
2.4 MB |
|
4.5 MB |
|
5.1 MB |
/.../9. Monitoring Service Logs/ |
|
|
616.5 KB |
|
7.5 MB |
|
1.2 MB |
|
3.2 MB |
|
3.4 MB |
|
7.6 MB |
|
496.2 KB |
|
2.1 MB |
|
10.9 MB |
|
1.6 MB |
|
1.8 MB |
|
5.7 MB |
|
4.3 MB |
/.../10. Monitoring Change to Devices and Appliances/ |
|
|
940.4 KB |
|
1.8 MB |
|
2.2 MB |
|
2.4 MB |
|
517.6 KB |
/.../11. Leveraging Proxy and Firewall Data/ |
|
|
788.9 KB |
|
1.8 MB |
|
660.3 KB |
|
1.9 MB |
|
3.1 MB |
|
3.9 MB |
|
2.3 MB |
|
2.2 MB |
|
2.2 MB |
|
1.8 MB |
|
12.1 MB |
|
2.3 MB |
/.../12. Monitoring Critical Windows Events/ |
|
|
473.7 KB |
|
7.1 MB |
|
5.6 MB |
|
3.7 MB |
|
1.7 MB |
|
1.4 MB |
|
5.1 MB |
|
1.2 MB |
|
4.0 MB |
|
10.7 MB |
|
1.5 MB |
|
2.0 MB |
|
7.1 MB |
|
1.3 MB |
15. System Event ID 7045 Sysinternals versus Metasploit PsExec.mp4 |
4.1 MB |
|
1.7 MB |
|
1.4 MB |
|
3.0 MB |
19. Event Viewer Security Log View net user sec511 sekrit add.mp4 |
2.1 MB |
|
2.5 MB |
21. Event Viewer Security Log View net localgroup administrators sec511 add.mp4 |
792.5 KB |
|
1.0 MB |
|
4.9 MB |
24. Critical Event 6 Terminal Services Certificate Creation.mp4 |
2.3 MB |
|
2.9 MB |
|
3.2 MB |
|
2.5 MB |
|
2.9 MB |
|
1.9 MB |
|
2.4 MB |
|
10.5 MB |
|
3.0 MB |
|
7.9 MB |
|
1.7 MB |
|
8.9 MB |
|
782.1 KB |
|
8.2 MB |
|
1.9 MB |
|
1.4 MB |
|
1.2 MB |
|
1.7 MB |
|
1.1 MB |
|
40.3 MB |
/.../13. Scripting and Automation/ |
|
|
2.6 MB |
|
2.6 MB |
|
1.8 MB |
|
1.2 MB |
|
2.7 MB |
|
876.3 KB |
|
2.4 MB |
|
4.3 MB |
|
1.1 MB |
|
6.4 MB |
|
2.5 MB |
|
1.7 MB |
|
1.7 MB |
|
1.2 MB |
|
1.4 MB |
|
2.7 MB |
|
7.2 MB |
18. Use Case DeepBlueCLI vs PowerShell via WMIC and PsExec.mp4 |
2.3 MB |
/.../14. PostIntrusion Detection/ |
|
|
1.1 MB |
|
2.1 MB |
|
2.9 MB |
|
2.9 MB |
|
7.0 MB |
/.../15. Section 5 Summary/ |
|
|
1.4 MB |
|
27.6 MB |
|
79.4 MB |
|
58.2 KB |
|
66.9 KB |
/.../16. Appendix Centralize Windows Event Logs MBSA/ |
|
|
141.3 KB |
|
107.3 KB |
|
112.9 KB |
|
117.0 KB |
|
104.0 KB |
|
114.5 KB |
|
117.2 KB |
|
93.9 KB |
|
93.7 KB |
|
84.0 KB |
|
77.7 KB |
|
95.4 KB |
|
88.0 KB |
/.../1. Capstone Design Detect Defend/ |
|
|
4.6 MB |
|
55.3 MB |
3. Section 6 Continuous Monitoring and Security Operations Capstone.mp4 |
1.3 GB |
Total files 972 |
Copyright © 2025 FileMood.com