[ ] Linkedin - Implementing and Administering Microsoft Sentinel
- 收录时间:2022-04-09 07:57:35
- 文件大小:858MB
- 下载次数:1
- 最近下载:2022-04-09 07:57:35
- 磁力链接:
-
文件列表
- ~Get Your Files Here !/4. Threat Detection, Investigation, and Response/010. Detecting threats.mp4 76MB
- ~Get Your Files Here !/4. Threat Detection, Investigation, and Response/012. Responding to threats with playbooks.mp4 73MB
- ~Get Your Files Here !/2. Introduction and Concepts/006. Kusto query language quickstart.mp4 70MB
- ~Get Your Files Here !/4. Threat Detection, Investigation, and Response/014. UEBA and machine learning.mp4 67MB
- ~Get Your Files Here !/3. Configuring Microsoft Sentinel/009. Integrating threat intelligence.mp4 64MB
- ~Get Your Files Here !/5. Advanced Threat Hunting Scenarios/017. Hunting with notebooks.mp4 57MB
- ~Get Your Files Here !/4. Threat Detection, Investigation, and Response/013. Security orchestration, automation, and response (SOAR).mp4 52MB
- ~Get Your Files Here !/5. Advanced Threat Hunting Scenarios/018. Workbooks and dashboards.mp4 50MB
- ~Get Your Files Here !/3. Configuring Microsoft Sentinel/008. Connecting external services.mp4 49MB
- ~Get Your Files Here !/4. Threat Detection, Investigation, and Response/011. Investigating incidents.mp4 48MB
- ~Get Your Files Here !/5. Advanced Threat Hunting Scenarios/015. Threat hunting basics.mp4 43MB
- ~Get Your Files Here !/3. Configuring Microsoft Sentinel/007. Connecting Microsoft services.mp4 41MB
- ~Get Your Files Here !/2. Introduction and Concepts/004. Sentinel feature flyover.mp4 40MB
- ~Get Your Files Here !/2. Introduction and Concepts/005. Onboarding Microsoft Sentinel.mp4 38MB
- ~Get Your Files Here !/5. Advanced Threat Hunting Scenarios/016. Hunting with bookmarks.mp4 31MB
- ~Get Your Files Here !/5. Advanced Threat Hunting Scenarios/019. Integrating with M365 Defender.mp4 28MB
- ~Get Your Files Here !/1. Introduction/001. Need a central point of analysis for security events.mp4 9MB
- ~Get Your Files Here !/1. Introduction/003. Lab setup.mp4 9MB
- ~Get Your Files Here !/6. Conclusion/020. Next steps.mp4 7MB
- ~Get Your Files Here !/1. Introduction/002. What you should know.mp4 6MB
- ~Get Your Files Here !/Ex_Files_Implementing_Administering_Microsoft_Sentinel/Exercise Files/Additional Resources.pdf 66KB
- ~Get Your Files Here !/4. Threat Detection, Investigation, and Response/010. Detecting threats.en.srt 14KB
- ~Get Your Files Here !/4. Threat Detection, Investigation, and Response/012. Responding to threats with playbooks.en.srt 13KB
- ~Get Your Files Here !/4. Threat Detection, Investigation, and Response/014. UEBA and machine learning.en.srt 13KB
- ~Get Your Files Here !/3. Configuring Microsoft Sentinel/009. Integrating threat intelligence.en.srt 11KB
- ~Get Your Files Here !/2. Introduction and Concepts/006. Kusto query language quickstart.en.srt 11KB
- ~Get Your Files Here !/5. Advanced Threat Hunting Scenarios/017. Hunting with notebooks.en.srt 11KB
- ~Get Your Files Here !/4. Threat Detection, Investigation, and Response/013. Security orchestration, automation, and response (SOAR).en.srt 9KB
- ~Get Your Files Here !/5. Advanced Threat Hunting Scenarios/018. Workbooks and dashboards.en.srt 9KB
- ~Get Your Files Here !/3. Configuring Microsoft Sentinel/008. Connecting external services.en.srt 9KB
- ~Get Your Files Here !/4. Threat Detection, Investigation, and Response/011. Investigating incidents.en.srt 9KB
- ~Get Your Files Here !/5. Advanced Threat Hunting Scenarios/015. Threat hunting basics.en.srt 8KB
- ~Get Your Files Here !/2. Introduction and Concepts/004. Sentinel feature flyover.en.srt 7KB
- ~Get Your Files Here !/3. Configuring Microsoft Sentinel/007. Connecting Microsoft services.en.srt 7KB
- ~Get Your Files Here !/2. Introduction and Concepts/005. Onboarding Microsoft Sentinel.en.srt 6KB
- ~Get Your Files Here !/5. Advanced Threat Hunting Scenarios/016. Hunting with bookmarks.en.srt 5KB
- ~Get Your Files Here !/5. Advanced Threat Hunting Scenarios/019. Integrating with M365 Defender.en.srt 5KB
- ~Get Your Files Here !/1. Introduction/001. Need a central point of analysis for security events.en.srt 2KB
- ~Get Your Files Here !/1. Introduction/003. Lab setup.en.srt 2KB
- ~Get Your Files Here !/6. Conclusion/020. Next steps.en.srt 1KB
- ~Get Your Files Here !/1. Introduction/002. What you should know.en.srt 1KB
- ~Get Your Files Here !/Bonus Resources.txt 386B
- Get Bonus Downloads Here.url 176B