Blue Team Boot Camp Defending Against Hackers 收录时间:2022-01-29 02:14:56 文件大小:6GB 下载次数:1 最近下载:2022-01-29 02:14:56 磁力链接: magnet:?xt=urn:btih:c16190d6b662a302f4d0299f7de2bf4bf51daf1c 立即下载 复制链接 文件列表 4. Network Security/4. IDS.mp4 412MB 4. Network Security/6. Active Directory.mp4 321MB 3. Endpoint Security/24. MITRE ATT&CK.mp4 232MB 3. Endpoint Security/2. Application Whitelisting.mp4 204MB 3. Endpoint Security/15. Basic Linux Hardening.mp4 194MB 3. Endpoint Security/17. Linux Fundamentals.mp4 186MB 3. Endpoint Security/5. Windows Fundamentals.mp4 184MB 3. Endpoint Security/11. PowerShell.mp4 181MB 3. Endpoint Security/22. FIM in Linux.mp4 178MB 4. Network Security/10. DNS.mp4 165MB 3. Endpoint Security/20. Native Linux Firewalls.mp4 162MB 3. Endpoint Security/18. SELinux.mp4 156MB 3. Endpoint Security/6. Additional Windows Security Measures.mp4 156MB 3. Endpoint Security/1. Passwords.mp4 149MB 4. Network Security/8. Lateral Movement.mp4 131MB 2. Risk Analysis and Threat Intelligence/2. Threat Intelligence.mp4 127MB 4. Network Security/9. Command and Control.mp4 127MB 1. Introduction/2. Security Principles.mp4 125MB 3. Endpoint Security/4. Basic Windows Hardening.mp4 123MB 3. Endpoint Security/3. EDR.mp4 117MB 2. Risk Analysis and Threat Intelligence/1. Risk Analysis.mp4 109MB 4. Network Security/11. Password Spraying.mp4 98MB 5. Log Aggregation and Correlation/6. Log Correlation.mp4 98MB 3. Endpoint Security/7. CIS Benchmarks (Windows 10).mp4 97MB 2. Risk Analysis and Threat Intelligence/3. Asset Management.mp4 93MB 4. Network Security/12. Pass The Hash.mp4 91MB 3. Endpoint Security/16. CIS Benchmarks (Linux).mp4 90MB 4. Network Security/2. Encryption.mp4 83MB 5. Log Aggregation and Correlation/4. Agent vs. Agentless.mp4 81MB 3. Endpoint Security/26. Supply Chain Attacks.mp4 79MB 3. Endpoint Security/9. Basic WMI.mp4 78MB 5. Log Aggregation and Correlation/10. Additional Information.mp4 76MB 3. Endpoint Security/8. Persistence.mp4 74MB 3. Endpoint Security/14. Quick Wins in Windows.mp4 73MB 5. Log Aggregation and Correlation/1. Log Aggregation.mp4 73MB 1. Introduction/1. Introduction.mp4 71MB 5. Log Aggregation and Correlation/5. Shipping Logs.mp4 70MB 2. Risk Analysis and Threat Intelligence/6. Cyber Kill Chain.mp4 69MB 4. Network Security/7. Proxy Servers.mp4 68MB 3. Endpoint Security/13. HIDS in Windows.mp4 67MB 5. Log Aggregation and Correlation/2. Windows Logs.mp4 66MB 3. Endpoint Security/12. FIM in Windows.mp4 62MB 4. Network Security/1. Firewalls.mp4 61MB 2. Risk Analysis and Threat Intelligence/4. Patch Management.mp4 60MB 5. Log Aggregation and Correlation/3. Linux Logs.mp4 52MB 4. Network Security/3. VLAN.mp4 50MB 3. Endpoint Security/10. OSQuery.mp4 50MB 5. Log Aggregation and Correlation/9. Aggregation and Correlation.mp4 49MB 4. Network Security/5. Packet Sniffer.mp4 46MB 3. Endpoint Security/19. ClamAV and Chkrootkit.mp4 46MB 4. Network Security/13. Critical Thinking Question.mp4 39MB 2. Risk Analysis and Threat Intelligence/5. Security Policies.mp4 38MB 3. Endpoint Security/25. Golden Images.mp4 35MB 1. Introduction/3. DISCLAIMER.mp4 32MB 3. Endpoint Security/23. Lynis.mp4 29MB 5. Log Aggregation and Correlation/7. Incident Manager.mp4 22MB 3. Endpoint Security/21. HIDS in Linux.mp4 19MB 5. Log Aggregation and Correlation/8. General Workflow Example.mp4 14MB 4. Network Security/4. IDS.srt 59KB 4. Network Security/6. Active Directory.srt 37KB 3. Endpoint Security/20. Native Linux Firewalls.srt 30KB 3. Endpoint Security/2. Application Whitelisting.srt 28KB 3. Endpoint Security/15. Basic Linux Hardening.srt 26KB 3. Endpoint Security/22. FIM in Linux.srt 26KB 3. Endpoint Security/24. MITRE ATT&CK.srt 25KB 3. Endpoint Security/17. Linux Fundamentals.srt 25KB 3. Endpoint Security/18. SELinux.srt 23KB 3. Endpoint Security/5. Windows Fundamentals.srt 20KB 3. Endpoint Security/11. PowerShell.srt 20KB 4. Network Security/10. DNS.srt 19KB 3. Endpoint Security/6. Additional Windows Security Measures.srt 18KB 3. Endpoint Security/1. Passwords.srt 18KB 1. Introduction/2. Security Principles.srt 18KB 3. Endpoint Security/4. Basic Windows Hardening.srt 17KB 4. Network Security/8. Lateral Movement.srt 16KB 2. Risk Analysis and Threat Intelligence/1. Risk Analysis.srt 14KB 2. Risk Analysis and Threat Intelligence/2. Threat Intelligence.srt 14KB 2. Risk Analysis and Threat Intelligence/3. Asset Management.srt 13KB 3. Endpoint Security/3. EDR.srt 13KB 4. Network Security/9. Command and Control.srt 12KB 5. Log Aggregation and Correlation/6. Log Correlation.srt 11KB 4. Network Security/2. Encryption.srt 10KB 3. Endpoint Security/16. CIS Benchmarks (Linux).srt 10KB 3. Endpoint Security/26. Supply Chain Attacks.srt 10KB 5. Log Aggregation and Correlation/4. Agent vs. Agentless.srt 9KB 3. Endpoint Security/7. CIS Benchmarks (Windows 10).srt 9KB 1. Introduction/1. Introduction.srt 9KB 5. Log Aggregation and Correlation/10. Additional Information.srt 9KB 4. Network Security/11. Password Spraying.srt 9KB 4. Network Security/12. Pass The Hash.srt 9KB 2. Risk Analysis and Threat Intelligence/6. Cyber Kill Chain.srt 9KB 5. Log Aggregation and Correlation/1. Log Aggregation.srt 9KB 4. Network Security/7. Proxy Servers.srt 8KB 2. Risk Analysis and Threat Intelligence/4. Patch Management.srt 8KB 3. Endpoint Security/9. Basic WMI.srt 8KB 3. Endpoint Security/8. Persistence.srt 8KB 5. Log Aggregation and Correlation/2. Windows Logs.srt 8KB 5. Log Aggregation and Correlation/5. Shipping Logs.srt 8KB 3. Endpoint Security/14. Quick Wins in Windows.srt 7KB 4. Network Security/1. Firewalls.srt 7KB 3. Endpoint Security/12. FIM in Windows.srt 6KB 5. Log Aggregation and Correlation/3. Linux Logs.srt 6KB 3. Endpoint Security/19. ClamAV and Chkrootkit.srt 6KB 3. Endpoint Security/13. HIDS in Windows.srt 6KB 4. Network Security/3. VLAN.srt 6KB 4. Network Security/5. Packet Sniffer.srt 5KB 5. Log Aggregation and Correlation/9. Aggregation and Correlation.srt 5KB 2. Risk Analysis and Threat Intelligence/5. Security Policies.srt 5KB 3. Endpoint Security/10. OSQuery.srt 5KB 3. Endpoint Security/25. Golden Images.srt 5KB 4. Network Security/13. Critical Thinking Question.srt 4KB 3. Endpoint Security/23. Lynis.srt 4KB 3. Endpoint Security/21. HIDS in Linux.srt 3KB 5. Log Aggregation and Correlation/7. Incident Manager.srt 2KB 5. Log Aggregation and Correlation/8. General Workflow Example.srt 2KB