589689.xyz

Blue Team Boot Camp Defending Against Hackers

  • 收录时间:2022-01-29 02:14:56
  • 文件大小:6GB
  • 下载次数:1
  • 最近下载:2022-01-29 02:14:56
  • 磁力链接:

文件列表

  1. 4. Network Security/4. IDS.mp4 412MB
  2. 4. Network Security/6. Active Directory.mp4 321MB
  3. 3. Endpoint Security/24. MITRE ATT&CK.mp4 232MB
  4. 3. Endpoint Security/2. Application Whitelisting.mp4 204MB
  5. 3. Endpoint Security/15. Basic Linux Hardening.mp4 194MB
  6. 3. Endpoint Security/17. Linux Fundamentals.mp4 186MB
  7. 3. Endpoint Security/5. Windows Fundamentals.mp4 184MB
  8. 3. Endpoint Security/11. PowerShell.mp4 181MB
  9. 3. Endpoint Security/22. FIM in Linux.mp4 178MB
  10. 4. Network Security/10. DNS.mp4 165MB
  11. 3. Endpoint Security/20. Native Linux Firewalls.mp4 162MB
  12. 3. Endpoint Security/18. SELinux.mp4 156MB
  13. 3. Endpoint Security/6. Additional Windows Security Measures.mp4 156MB
  14. 3. Endpoint Security/1. Passwords.mp4 149MB
  15. 4. Network Security/8. Lateral Movement.mp4 131MB
  16. 2. Risk Analysis and Threat Intelligence/2. Threat Intelligence.mp4 127MB
  17. 4. Network Security/9. Command and Control.mp4 127MB
  18. 1. Introduction/2. Security Principles.mp4 125MB
  19. 3. Endpoint Security/4. Basic Windows Hardening.mp4 123MB
  20. 3. Endpoint Security/3. EDR.mp4 117MB
  21. 2. Risk Analysis and Threat Intelligence/1. Risk Analysis.mp4 109MB
  22. 4. Network Security/11. Password Spraying.mp4 98MB
  23. 5. Log Aggregation and Correlation/6. Log Correlation.mp4 98MB
  24. 3. Endpoint Security/7. CIS Benchmarks (Windows 10).mp4 97MB
  25. 2. Risk Analysis and Threat Intelligence/3. Asset Management.mp4 93MB
  26. 4. Network Security/12. Pass The Hash.mp4 91MB
  27. 3. Endpoint Security/16. CIS Benchmarks (Linux).mp4 90MB
  28. 4. Network Security/2. Encryption.mp4 83MB
  29. 5. Log Aggregation and Correlation/4. Agent vs. Agentless.mp4 81MB
  30. 3. Endpoint Security/26. Supply Chain Attacks.mp4 79MB
  31. 3. Endpoint Security/9. Basic WMI.mp4 78MB
  32. 5. Log Aggregation and Correlation/10. Additional Information.mp4 76MB
  33. 3. Endpoint Security/8. Persistence.mp4 74MB
  34. 3. Endpoint Security/14. Quick Wins in Windows.mp4 73MB
  35. 5. Log Aggregation and Correlation/1. Log Aggregation.mp4 73MB
  36. 1. Introduction/1. Introduction.mp4 71MB
  37. 5. Log Aggregation and Correlation/5. Shipping Logs.mp4 70MB
  38. 2. Risk Analysis and Threat Intelligence/6. Cyber Kill Chain.mp4 69MB
  39. 4. Network Security/7. Proxy Servers.mp4 68MB
  40. 3. Endpoint Security/13. HIDS in Windows.mp4 67MB
  41. 5. Log Aggregation and Correlation/2. Windows Logs.mp4 66MB
  42. 3. Endpoint Security/12. FIM in Windows.mp4 62MB
  43. 4. Network Security/1. Firewalls.mp4 61MB
  44. 2. Risk Analysis and Threat Intelligence/4. Patch Management.mp4 60MB
  45. 5. Log Aggregation and Correlation/3. Linux Logs.mp4 52MB
  46. 4. Network Security/3. VLAN.mp4 50MB
  47. 3. Endpoint Security/10. OSQuery.mp4 50MB
  48. 5. Log Aggregation and Correlation/9. Aggregation and Correlation.mp4 49MB
  49. 4. Network Security/5. Packet Sniffer.mp4 46MB
  50. 3. Endpoint Security/19. ClamAV and Chkrootkit.mp4 46MB
  51. 4. Network Security/13. Critical Thinking Question.mp4 39MB
  52. 2. Risk Analysis and Threat Intelligence/5. Security Policies.mp4 38MB
  53. 3. Endpoint Security/25. Golden Images.mp4 35MB
  54. 1. Introduction/3. DISCLAIMER.mp4 32MB
  55. 3. Endpoint Security/23. Lynis.mp4 29MB
  56. 5. Log Aggregation and Correlation/7. Incident Manager.mp4 22MB
  57. 3. Endpoint Security/21. HIDS in Linux.mp4 19MB
  58. 5. Log Aggregation and Correlation/8. General Workflow Example.mp4 14MB
  59. 4. Network Security/4. IDS.srt 59KB
  60. 4. Network Security/6. Active Directory.srt 37KB
  61. 3. Endpoint Security/20. Native Linux Firewalls.srt 30KB
  62. 3. Endpoint Security/2. Application Whitelisting.srt 28KB
  63. 3. Endpoint Security/15. Basic Linux Hardening.srt 26KB
  64. 3. Endpoint Security/22. FIM in Linux.srt 26KB
  65. 3. Endpoint Security/24. MITRE ATT&CK.srt 25KB
  66. 3. Endpoint Security/17. Linux Fundamentals.srt 25KB
  67. 3. Endpoint Security/18. SELinux.srt 23KB
  68. 3. Endpoint Security/5. Windows Fundamentals.srt 20KB
  69. 3. Endpoint Security/11. PowerShell.srt 20KB
  70. 4. Network Security/10. DNS.srt 19KB
  71. 3. Endpoint Security/6. Additional Windows Security Measures.srt 18KB
  72. 3. Endpoint Security/1. Passwords.srt 18KB
  73. 1. Introduction/2. Security Principles.srt 18KB
  74. 3. Endpoint Security/4. Basic Windows Hardening.srt 17KB
  75. 4. Network Security/8. Lateral Movement.srt 16KB
  76. 2. Risk Analysis and Threat Intelligence/1. Risk Analysis.srt 14KB
  77. 2. Risk Analysis and Threat Intelligence/2. Threat Intelligence.srt 14KB
  78. 2. Risk Analysis and Threat Intelligence/3. Asset Management.srt 13KB
  79. 3. Endpoint Security/3. EDR.srt 13KB
  80. 4. Network Security/9. Command and Control.srt 12KB
  81. 5. Log Aggregation and Correlation/6. Log Correlation.srt 11KB
  82. 4. Network Security/2. Encryption.srt 10KB
  83. 3. Endpoint Security/16. CIS Benchmarks (Linux).srt 10KB
  84. 3. Endpoint Security/26. Supply Chain Attacks.srt 10KB
  85. 5. Log Aggregation and Correlation/4. Agent vs. Agentless.srt 9KB
  86. 3. Endpoint Security/7. CIS Benchmarks (Windows 10).srt 9KB
  87. 1. Introduction/1. Introduction.srt 9KB
  88. 5. Log Aggregation and Correlation/10. Additional Information.srt 9KB
  89. 4. Network Security/11. Password Spraying.srt 9KB
  90. 4. Network Security/12. Pass The Hash.srt 9KB
  91. 2. Risk Analysis and Threat Intelligence/6. Cyber Kill Chain.srt 9KB
  92. 5. Log Aggregation and Correlation/1. Log Aggregation.srt 9KB
  93. 4. Network Security/7. Proxy Servers.srt 8KB
  94. 2. Risk Analysis and Threat Intelligence/4. Patch Management.srt 8KB
  95. 3. Endpoint Security/9. Basic WMI.srt 8KB
  96. 3. Endpoint Security/8. Persistence.srt 8KB
  97. 5. Log Aggregation and Correlation/2. Windows Logs.srt 8KB
  98. 5. Log Aggregation and Correlation/5. Shipping Logs.srt 8KB
  99. 3. Endpoint Security/14. Quick Wins in Windows.srt 7KB
  100. 4. Network Security/1. Firewalls.srt 7KB
  101. 3. Endpoint Security/12. FIM in Windows.srt 6KB
  102. 5. Log Aggregation and Correlation/3. Linux Logs.srt 6KB
  103. 3. Endpoint Security/19. ClamAV and Chkrootkit.srt 6KB
  104. 3. Endpoint Security/13. HIDS in Windows.srt 6KB
  105. 4. Network Security/3. VLAN.srt 6KB
  106. 4. Network Security/5. Packet Sniffer.srt 5KB
  107. 5. Log Aggregation and Correlation/9. Aggregation and Correlation.srt 5KB
  108. 2. Risk Analysis and Threat Intelligence/5. Security Policies.srt 5KB
  109. 3. Endpoint Security/10. OSQuery.srt 5KB
  110. 3. Endpoint Security/25. Golden Images.srt 5KB
  111. 4. Network Security/13. Critical Thinking Question.srt 4KB
  112. 3. Endpoint Security/23. Lynis.srt 4KB
  113. 3. Endpoint Security/21. HIDS in Linux.srt 3KB
  114. 5. Log Aggregation and Correlation/7. Incident Manager.srt 2KB
  115. 5. Log Aggregation and Correlation/8. General Workflow Example.srt 2KB