A Guide to Security Information and Event Management - SIEM
- 收录时间:2022-12-14 13:39:52
- 文件大小:7GB
- 下载次数:1
- 最近下载:2022-12-14 13:39:52
- 磁力链接:
-
文件列表
- 17. Splunk Enterprise Security/4. Splunk ES - Part 4.mp4 1GB
- 11. Splunk/1. Introduction to Splunk's user interface.mp4 711MB
- 19. Security Devices/1. Learn more on Security Devices.mp4 637MB
- 17. Splunk Enterprise Security/1. Splunk ES - Part 1.mp4 606MB
- 18. Types of Viruses/1. Viruses.mp4 433MB
- 17. Splunk Enterprise Security/3. Splunk ES - Part 3.mp4 421MB
- 17. Splunk Enterprise Security/2. Splunk ES - Part 2.mp4 399MB
- 16. Splunk Creating alerts/1. Creating Alerts.mp4 365MB
- 22. Vulnerability Management/1. Vulnerability Management.mp4 345MB
- 8. Elements of SIEM/1. SIEM Elements.mp4 301MB
- 20. Email SMTP, Email system, webmail architecture - IMAP4 based/1. Email based attacks - social engineering, proxy server.mp4 249MB
- 13. Splunk Creating Reports and Dashboards/1. Creating Reports and Dashboards.mp4 195MB
- 9. SIEM Deployment Options/1. SIEM Deployment Options.mp4 184MB
- 21. Cyber security incidence response/1. Purpose of incident response, cyber security incidents, meantime to resolution.mp4 144MB
- 5. Log Management/1. Log management.mp4 81MB
- 7. Use Cases for SIEM/1. Use Cases for SIEM.mp4 78MB
- 6. Why is SIEM necessary/1. Why is SIEM necessary.mp4 75MB
- 15. Splunk Dashboards/1. Dashboards.mp4 71MB
- 12. Splunk Using basic transforming commands/1. Basic transforming commands.mp4 53MB
- 1. Introduction to SIEM/1. Introduction.mp4 52MB
- 3. Defence in Depth/1. Defence in Depth.mp4 44MB
- 4. Corporate environment/1. Corporate environment.mp4 35MB
- 14. Splunk Saving and sharing reports/1. Splunk Saving and sharing reports.mp4 30MB
- 2. Key Objectives of SIEM/1. Key Objectives of SIEM.mp4 10MB
- 19. Security Devices/1. Learn more on Security Devices.srt 133KB
- 11. Splunk/1. Introduction to Splunk's user interface.srt 95KB
- 17. Splunk Enterprise Security/1. Splunk ES - Part 1.srt 88KB
- 18. Types of Viruses/1. Viruses.srt 86KB
- 17. Splunk Enterprise Security/4. Splunk ES - Part 4.srt 71KB
- 16. Splunk Creating alerts/1. Creating Alerts.srt 53KB
- 8. Elements of SIEM/1. SIEM Elements.srt 53KB
- 21. Cyber security incidence response/1. Purpose of incident response, cyber security incidents, meantime to resolution.srt 50KB
- 17. Splunk Enterprise Security/2. Splunk ES - Part 2.srt 44KB
- 9. SIEM Deployment Options/1. SIEM Deployment Options.srt 40KB
- 17. Splunk Enterprise Security/3. Splunk ES - Part 3.srt 37KB
- 20. Email SMTP, Email system, webmail architecture - IMAP4 based/1. Email based attacks - social engineering, proxy server.srt 34KB
- 13. Splunk Creating Reports and Dashboards/1. Creating Reports and Dashboards.srt 25KB
- 7. Use Cases for SIEM/1. Use Cases for SIEM.srt 24KB
- 5. Log Management/1. Log management.srt 16KB
- 6. Why is SIEM necessary/1. Why is SIEM necessary.srt 15KB
- 15. Splunk Dashboards/1. Dashboards.srt 9KB
- 12. Splunk Using basic transforming commands/1. Basic transforming commands.srt 8KB
- 1. Introduction to SIEM/1. Introduction.srt 8KB
- 3. Defence in Depth/1. Defence in Depth.srt 6KB
- 14. Splunk Saving and sharing reports/1. Splunk Saving and sharing reports.srt 5KB
- 4. Corporate environment/1. Corporate environment.srt 5KB
- 2. Key Objectives of SIEM/1. Key Objectives of SIEM.srt 2KB
- 10. Quiz Time/1. Reading Assignment.html 172B
- 21. Cyber security incidence response/2. Mastering Windows Network Forensics and Investigation.html 172B
- 5. Log Management/2. Windows Security Monitoring Scenarios and Patterns.html 172B
- 10. Quiz Time/2. SIEM Essentials Quiz.html 168B
- 7. Use Cases for SIEM/1.1 SIEM Use cases.html 144B