589689.xyz

SANS505 PowerShell 2017

  • 收录时间:2018-03-10 13:10:32
  • 文件大小:6GB
  • 下载次数:94
  • 最近下载:2020-12-18 03:31:54
  • 磁力链接:

文件列表

  1. Section 3 Windows PKI and Smart Cards/3.2 PKI Overview, Benefits and Tools/SANS OnDemand_6.WEBM 146MB
  2. SEC505.1 PowerShell Automation and Security.pdf 88MB
  3. SEC505.2 Continuous Secure Configuration Enforcement.pdf 86MB
  4. Section 3 Windows PKI and Smart Cards/3.3 Installing Certificate Services/SANS OnDemand_6.WEBM 85MB
  5. SEC505.4 Administrative Compromise and Privilege Management.pdf 84MB
  6. Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_5.WEBM 80MB
  7. SEC505.6 Defensible Networking and Blue Team WMI.pdf 79MB
  8. Section 5 Endpoint Protection and Pre-Forensics/5.2 Host-Based Windows Firewalls/SANS OnDemand_7.WEBM 74MB
  9. SEC505.5 Endpoint Protection and Pre-Forensics.pdf 73MB
  10. Section 3 Windows PKI and Smart Cards/3.5 Managing Your PKI/SANS OnDemand_3.WEBM 72MB
  11. SEC505.3 Windows PKI and Smart Cards.pdf 71MB
  12. Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_22.WEBM 67MB
  13. Section 5 Endpoint Protection and Pre-Forensics/5.3 IPSec For Role-Based Port Control/SANS OnDemand_8.WEBM 67MB
  14. Section 3 Windows PKI and Smart Cards/3.4 Private Key Security Best Practices/SANS OnDemand_2.WEBM 66MB
  15. Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_7.WEBM 66MB
  16. Section 3 Windows PKI and Smart Cards/3.2 PKI Overview, Benefits and Tools/SANS OnDemand_3.WEBM 57MB
  17. Section 5 Endpoint Protection and Pre-Forensics/5.2 Host-Based Windows Firewalls/SANS OnDemand_8.WEBM 57MB
  18. Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_7.WEBM 56MB
  19. Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_17.WEBM 54MB
  20. Section 3 Windows PKI and Smart Cards/3.2 PKI Overview, Benefits and Tools/SANS OnDemand_7.WEBM 52MB
  21. Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand_6.WEBM 52MB
  22. Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_29.WEBM 51MB
  23. Section 3 Windows PKI and Smart Cards/3.5 Managing Your PKI/SANS OnDemand_5.WEBM 51MB
  24. Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_24.WEBM 51MB
  25. Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand_12.WEBM 51MB
  26. Section 3 Windows PKI and Smart Cards/3.3 Installing Certificate Services/SANS OnDemand_7.WEBM 51MB
  27. Section 3 Windows PKI and Smart Cards/3.3 Installing Certificate Services/SANS OnDemand_2.WEBM 50MB
  28. Section 1 PowerShell Automation and Security/1.2 PowerShell Overview and Tips/6.WEBM 50MB
  29. Section 3 Windows PKI and Smart Cards/3.6 Smart Cards and TPMs/SANS OnDemand_2.WEBM 48MB
  30. Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_26.WEBM 48MB
  31. Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand_11.WEBM 48MB
  32. Section 4 Administrative Compromise and Privilege Management/4.4 Managing Administrative Privileges In Active Directory/SANS OnDemand_3.WEBM 46MB
  33. Section 3 Windows PKI and Smart Cards/3.5 Managing Your PKI/SANS OnDemand_2.WEBM 46MB
  34. Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_28.WEBM 45MB
  35. Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_11.WEBM 45MB
  36. Learn.Windows.PowerShell.in.a.Month.of.Lunches.3rd.pdf 41MB
  37. Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_17.WEBM 41MB
  38. Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_15.WEBM 40MB
  39. Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_27.WEBM 40MB
  40. Section 1 PowerShell Automation and Security/1.1 Introduction PowerShell Automation and Security/SANS OnDemand_2.WEBM 39MB
  41. Section 5 Endpoint Protection and Pre-Forensics/5.3 IPSec For Role-Based Port Control/SANS OnDemand_12.WEBM 39MB
  42. Section 3 Windows PKI and Smart Cards/3.5 Managing Your PKI/SANS OnDemand_8.WEBM 39MB
  43. Section 3 Windows PKI and Smart Cards/3.2 PKI Overview, Benefits and Tools/SANS OnDemand_9.WEBM 39MB
  44. Section 3 Windows PKI and Smart Cards/3.6 Smart Cards and TPMs/SANS OnDemand_5.WEBM 38MB
  45. Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_18.WEBM 38MB
  46. Section 1 PowerShell Automation and Security/1.2 PowerShell Overview and Tips/2.WEBM 37MB
  47. Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_5.WEBM 36MB
  48. Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_21.WEBM 36MB
  49. Section 1 PowerShell Automation and Security/1.3 Modules, Functions and PowerShell Remoting/SANS OnDemand_3.WEBM 36MB
  50. Section 3 Windows PKI and Smart Cards/3.5 Managing Your PKI/SANS OnDemand_4.WEBM 36MB
  51. Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_25.WEBM 35MB
  52. Section 1 PowerShell Automation and Security/1.5 Writing Your Own Functions and Scripts/SANS OnDemand_13.WEBM 35MB
  53. Section 5 Endpoint Protection and Pre-Forensics/5.2 Host-Based Windows Firewalls/SANS OnDemand_11.WEBM 34MB
  54. Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_23.WEBM 34MB
  55. Section 3 Windows PKI and Smart Cards/3.3 Installing Certificate Services/SANS OnDemand_8.WEBM 34MB
  56. Section 3 Windows PKI and Smart Cards/3.5 Managing Your PKI/SANS OnDemand_7.WEBM 34MB
  57. Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_19.WEBM 33MB
  58. Section 3 Windows PKI and Smart Cards/3.2 PKI Overview, Benefits and Tools/SANS OnDemand_4.WEBM 33MB
  59. Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_12.WEBM 33MB
  60. Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand_8.WEBM 32MB
  61. Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_4.WEBM 32MB
  62. Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_13.WEBM 31MB
  63. Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand_4.WEBM 31MB
  64. Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand_15.WEBM 30MB
  65. Section 1 PowerShell Automation and Security/1.2 PowerShell Overview and Tips/7.WEBM 29MB
  66. Section 4 Administrative Compromise and Privilege Management/4.4 Managing Administrative Privileges In Active Directory/SANS OnDemand_6.WEBM 29MB
  67. Section 3 Windows PKI and Smart Cards/3.3 Installing Certificate Services/SANS OnDemand_5.WEBM 29MB
  68. Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_8.WEBM 29MB
  69. Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_26.WEBM 29MB
  70. Section 2 Continuous Secure Configarion Enforcement/2.2 Security Templates/SANS OnDemand_5.WEBM 29MB
  71. Section 1 PowerShell Automation and Security/1.2 PowerShell Overview and Tips/14.WEBM 29MB
  72. Section 3 Windows PKI and Smart Cards/3.2 PKI Overview, Benefits and Tools/SANS OnDemand_5.WEBM 28MB
  73. Section 5 Endpoint Protection and Pre-Forensics/5.6 Assume Breach With Pre-Forensics/SANS OnDemand_6.WEBM 28MB
  74. Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand_3.WEBM 28MB
  75. Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_16.WEBM 27MB
  76. Section 1 PowerShell Automation and Security/1.2 PowerShell Overview and Tips/9.WEBM 27MB
  77. Section 3 Windows PKI and Smart Cards/3.4 Private Key Security Best Practices/SANS OnDemand_4.WEBM 27MB
  78. Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_5.WEBM 27MB
  79. Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_27.WEBM 26MB
  80. Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand_7.WEBM 26MB
  81. Section 1 PowerShell Automation and Security/1.2 PowerShell Overview and Tips/13.WEBM 25MB
  82. Section 5 Endpoint Protection and Pre-Forensics/5.5 Anti-Exploit Techniques/SANS OnDemand_7.WEBM 25MB
  83. Section 2 Continuous Secure Configarion Enforcement/2.4 Server Hardening for SecOps/SANS OnDemand_5.WEBM 25MB
  84. Section 3 Windows PKI and Smart Cards/3.3 Installing Certificate Services/SANS OnDemand_4.WEBM 25MB
  85. Section 1 PowerShell Automation and Security/1.3 Modules, Functions and PowerShell Remoting/SANS OnDemand_10.WEBM 24MB
  86. Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand_9.WEBM 24MB
  87. Section 2 Continuous Secure Configarion Enforcement/2.2 Security Templates/SANS OnDemand_10.WEBM 24MB
  88. Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand.WEBM 24MB
  89. Section 1 PowerShell Automation and Security/1.3 Modules, Functions and PowerShell Remoting/SANS OnDemand_2.WEBM 24MB
  90. Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_13.WEBM 23MB
  91. Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_27.WEBM 23MB
  92. Section 5 Endpoint Protection and Pre-Forensics/5.5 Anti-Exploit Techniques/SANS OnDemand_6.WEBM 23MB
  93. Section 5 Endpoint Protection and Pre-Forensics/5.3 IPSec For Role-Based Port Control/SANS OnDemand_2.WEBM 23MB
  94. Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_6.WEBM 22MB
  95. Section 5 Endpoint Protection and Pre-Forensics/5.5 Anti-Exploit Techniques/SANS OnDemand_13.WEBM 22MB
  96. Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_4.WEBM 22MB
  97. Section 2 Continuous Secure Configarion Enforcement/2.4 Server Hardening for SecOps/SANS OnDemand_10.WEBM 22MB
  98. Section 1 PowerShell Automation and Security/1.2 PowerShell Overview and Tips/10.WEBM 22MB
  99. Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_17.WEBM 22MB
  100. Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_31.WEBM 21MB
  101. Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_12.WEBM 21MB
  102. Section 5 Endpoint Protection and Pre-Forensics/5.6 Assume Breach With Pre-Forensics/SANS OnDemand_4.WEBM 21MB
  103. Section 5 Endpoint Protection and Pre-Forensics/5.3 IPSec For Role-Based Port Control/SANS OnDemand_5.WEBM 21MB
  104. Section 2 Continuous Secure Configarion Enforcement/2.4 Server Hardening for SecOps/SANS OnDemand_4.WEBM 21MB
  105. Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_10.WEBM 20MB
  106. Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_23.WEBM 20MB
  107. Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_34.WEBM 20MB
  108. Section 1 PowerShell Automation and Security/1.3 Modules, Functions and PowerShell Remoting/SANS OnDemand_5.WEBM 20MB
  109. Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_21.WEBM 20MB
  110. Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_10.WEBM 20MB
  111. Section 2 Continuous Secure Configarion Enforcement/2.2 Security Templates/SANS OnDemand_8.WEBM 19MB
  112. Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_15.WEBM 19MB
  113. Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_12.WEBM 19MB
  114. Section 1 PowerShell Automation and Security/1.3 Modules, Functions and PowerShell Remoting/SANS OnDemand_9.WEBM 19MB
  115. Section 1 PowerShell Automation and Security/1.2 PowerShell Overview and Tips/5.WEBM 19MB
  116. Section 4 Administrative Compromise and Privilege Management/4.4 Managing Administrative Privileges In Active Directory/SANS OnDemand_5.WEBM 18MB
  117. Section 5 Endpoint Protection and Pre-Forensics/5.4 Firewall and IPSec Endpoint Automation/SANS OnDemand_3.WEBM 18MB
  118. Section 2 Continuous Secure Configarion Enforcement/2.4 Server Hardening for SecOps/SANS OnDemand_3.WEBM 18MB
  119. Section 3 Windows PKI and Smart Cards/3.2 PKI Overview, Benefits and Tools/SANS OnDemand.WEBM 18MB
  120. Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_4.WEBM 17MB
  121. Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_20.WEBM 17MB
  122. Section 5 Endpoint Protection and Pre-Forensics/5.3 IPSec For Role-Based Port Control/SANS OnDemand_3.WEBM 17MB
  123. Section 2 Continuous Secure Configarion Enforcement/2.4 Server Hardening for SecOps/SANS OnDemand_9.WEBM 16MB
  124. Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_16.WEBM 16MB
  125. Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_19.WEBM 16MB
  126. Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_19.WEBM 16MB
  127. Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_16.WEBM 16MB
  128. Section 5 Endpoint Protection and Pre-Forensics/5.2 Host-Based Windows Firewalls/SANS OnDemand_3.WEBM 16MB
  129. Section 1 PowerShell Automation and Security/1.5 Writing Your Own Functions and Scripts/SANS OnDemand_9.WEBM 15MB
  130. Section 2 Continuous Secure Configarion Enforcement/2.2 Security Templates/SANS OnDemand_4.WEBM 15MB
  131. Section 5 Endpoint Protection and Pre-Forensics/5.4 Firewall and IPSec Endpoint Automation/SANS OnDemand_4.WEBM 15MB
  132. Section 2 Continuous Secure Configarion Enforcement/2.4 Server Hardening for SecOps/SANS OnDemand_7.WEBM 15MB
  133. Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_15.WEBM 15MB
  134. Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_8.WEBM 15MB
  135. Section 5 Endpoint Protection and Pre-Forensics/5.5 Anti-Exploit Techniques/SANS OnDemand_11.WEBM 14MB
  136. Section 5 Endpoint Protection and Pre-Forensics/5.2 Host-Based Windows Firewalls/SANS OnDemand_6.WEBM 14MB
  137. Section 5 Endpoint Protection and Pre-Forensics/5.5 Anti-Exploit Techniques/SANS OnDemand_4.WEBM 14MB
  138. Section 5 Endpoint Protection and Pre-Forensics/5.5 Anti-Exploit Techniques/SANS OnDemand_2.WEBM 14MB
  139. Section 3 Windows PKI and Smart Cards/3.4 Private Key Security Best Practices/SANS OnDemand_3.WEBM 14MB
  140. Section 5 Endpoint Protection and Pre-Forensics/5.6 Assume Breach With Pre-Forensics/SANS OnDemand_8.WEBM 13MB
  141. Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_24.WEBM 13MB
  142. Section 1 PowerShell Automation and Security/1.5 Writing Your Own Functions and Scripts/SANS OnDemand_11.WEBM 13MB
  143. Section 5 Endpoint Protection and Pre-Forensics/5.6 Assume Breach With Pre-Forensics/SANS OnDemand_7.WEBM 12MB
  144. Section 5 Endpoint Protection and Pre-Forensics/5.2 Host-Based Windows Firewalls/SANS OnDemand_5.WEBM 12MB
  145. Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand_14.WEBM 12MB
  146. Section 1 PowerShell Automation and Security/1.2 PowerShell Overview and Tips/12.WEBM 12MB
  147. Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_35.WEBM 12MB
  148. Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_20.WEBM 11MB
  149. Section 3 Windows PKI and Smart Cards/3.3 Installing Certificate Services/SANS OnDemand_3.WEBM 11MB
  150. Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_22.WEBM 11MB
  151. Section 4 Administrative Compromise and Privilege Management/4.4 Managing Administrative Privileges In Active Directory/SANS OnDemand_7.WEBM 11MB
  152. Section 3 Windows PKI and Smart Cards/3.6 Smart Cards and TPMs/SANS OnDemand_4.WEBM 11MB
  153. Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_10.WEBM 11MB
  154. windows-powershell-action-3rd.pdf 11MB
  155. Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_14.WEBM 11MB
  156. Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_2.WEBM 11MB
  157. Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_11.WEBM 10MB
  158. Section 1 PowerShell Automation and Security/1.5 Writing Your Own Functions and Scripts/SANS OnDemand_7.WEBM 10MB
  159. Section 2 Continuous Secure Configarion Enforcement/2.4 Server Hardening for SecOps/SANS OnDemand_11.WEBM 10MB
  160. Section 5 Endpoint Protection and Pre-Forensics/5.6 Assume Breach With Pre-Forensics/SANS OnDemand_3.WEBM 10MB
  161. Section 1 PowerShell Automation and Security/1.5 Writing Your Own Functions and Scripts/SANS OnDemand_6.WEBM 10MB
  162. Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_14.WEBM 10MB
  163. Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_18.WEBM 10MB
  164. Section 5 Endpoint Protection and Pre-Forensics/5.6 Assume Breach With Pre-Forensics/SANS OnDemand_5.WEBM 10MB
  165. Section 1 PowerShell Automation and Security/1.3 Modules, Functions and PowerShell Remoting/SANS OnDemand_4.WEBM 10MB
  166. Section 5 Endpoint Protection and Pre-Forensics/5.3 IPSec For Role-Based Port Control/SANS OnDemand_6.WEBM 10MB
  167. Section 1 PowerShell Automation and Security/1.5 Writing Your Own Functions and Scripts/SANS OnDemand_4.WEBM 10MB
  168. Section 3 Windows PKI and Smart Cards/3.5 Managing Your PKI/SANS OnDemand_6.WEBM 9MB
  169. Section 1 PowerShell Automation and Security/1.2 PowerShell Overview and Tips/11.WEBM 9MB
  170. Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand_16.WEBM 9MB
  171. Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_11.WEBM 9MB
  172. Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_36.WEBM 9MB
  173. Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_11.WEBM 9MB
  174. Section 5 Endpoint Protection and Pre-Forensics/5.2 Host-Based Windows Firewalls/SANS OnDemand_10.WEBM 9MB
  175. Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_6.WEBM 9MB
  176. Section 5 Endpoint Protection and Pre-Forensics/5.3 IPSec For Role-Based Port Control/SANS OnDemand_7.WEBM 9MB
  177. Section 2 Continuous Secure Configarion Enforcement/2.2 Security Templates/SANS OnDemand_9.WEBM 9MB
  178. Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_6.WEBM 9MB
  179. Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_18.WEBM 9MB
  180. Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_17.WEBM 9MB
  181. Section 4 Administrative Compromise and Privilege Management/4.4 Managing Administrative Privileges In Active Directory/SANS OnDemand_10.WEBM 9MB
  182. Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_2.WEBM 8MB
  183. Section 5 Endpoint Protection and Pre-Forensics/5.5 Anti-Exploit Techniques/SANS OnDemand_9.WEBM 8MB
  184. Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_13.WEBM 8MB
  185. Section 5 Endpoint Protection and Pre-Forensics/5.6 Assume Breach With Pre-Forensics/SANS OnDemand_2.WEBM 8MB
  186. Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_3.WEBM 8MB
  187. Section 4 Administrative Compromise and Privilege Management/4.4 Managing Administrative Privileges In Active Directory/SANS OnDemand_8.WEBM 8MB
  188. Section 1 PowerShell Automation and Security/1.5 Writing Your Own Functions and Scripts/SANS OnDemand_10.WEBM 8MB
  189. Section 1 PowerShell Automation and Security/1.3 Modules, Functions and PowerShell Remoting/SANS OnDemand_11.WEBM 7MB
  190. Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_37.WEBM 7MB
  191. Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_24.WEBM 7MB
  192. Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_14.WEBM 7MB
  193. Section 2 Continuous Secure Configarion Enforcement/2.4 Server Hardening for SecOps/SANS OnDemand_2.WEBM 7MB
  194. Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_23.WEBM 7MB
  195. Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_9.WEBM 7MB
  196. Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_20.WEBM 7MB
  197. Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand_2.WEBM 7MB
  198. Section 4 Administrative Compromise and Privilege Management/4.4 Managing Administrative Privileges In Active Directory/SANS OnDemand_4.WEBM 7MB
  199. Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_25.WEBM 7MB
  200. Section 3 Windows PKI and Smart Cards/3.2 PKI Overview, Benefits and Tools/SANS OnDemand_2.WEBM 7MB
  201. Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_9.WEBM 7MB
  202. Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_38.WEBM 7MB
  203. Section 5 Endpoint Protection and Pre-Forensics/5.2 Host-Based Windows Firewalls/SANS OnDemand.WEBM 7MB
  204. Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_23.WEBM 6MB
  205. Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_2.WEBM 6MB
  206. Section 5 Endpoint Protection and Pre-Forensics/5.5 Anti-Exploit Techniques/SANS OnDemand_8.WEBM 6MB
  207. Section 4 Administrative Compromise and Privilege Management/4.4 Managing Administrative Privileges In Active Directory/SANS OnDemand_2.WEBM 6MB
  208. Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_14.WEBM 6MB
  209. Section 3 Windows PKI and Smart Cards/3.6 Smart Cards and TPMs/SANS OnDemand_3.WEBM 6MB
  210. Section 1 PowerShell Automation and Security/1.3 Modules, Functions and PowerShell Remoting/SANS OnDemand_7.WEBM 6MB
  211. Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_13.WEBM 6MB
  212. Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_12.WEBM 6MB
  213. Section 5 Endpoint Protection and Pre-Forensics/5.4 Firewall and IPSec Endpoint Automation/SANS OnDemand_2.WEBM 6MB
  214. Section 2 Continuous Secure Configarion Enforcement/2.4 Server Hardening for SecOps/SANS OnDemand_8.WEBM 6MB
  215. Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand_5.WEBM 6MB
  216. Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_17.WEBM 6MB
  217. Section 2 Continuous Secure Configarion Enforcement/2.2 Security Templates/SANS OnDemand_6.WEBM 6MB
  218. Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_7.WEBM 6MB
  219. Section 1 PowerShell Automation and Security/1.5 Writing Your Own Functions and Scripts/SANS OnDemand_3.WEBM 5MB
  220. Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_18.WEBM 5MB
  221. Section 5 Endpoint Protection and Pre-Forensics/5.2 Host-Based Windows Firewalls/SANS OnDemand_9.WEBM 5MB
  222. Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_20.WEBM 5MB
  223. Section 1 PowerShell Automation and Security/1.5 Writing Your Own Functions and Scripts/SANS OnDemand_5.WEBM 5MB
  224. Section 1 PowerShell Automation and Security/1.3 Modules, Functions and PowerShell Remoting/SANS OnDemand_6.WEBM 5MB
  225. Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_14.WEBM 5MB
  226. Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_22.WEBM 5MB
  227. Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_14.WEBM 5MB
  228. Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_32.WEBM 5MB
  229. Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_25.WEBM 5MB
  230. Section 3 Windows PKI and Smart Cards/3.2 PKI Overview, Benefits and Tools/SANS OnDemand_8.WEBM 5MB
  231. Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_7.WEBM 5MB
  232. Section 2 Continuous Secure Configarion Enforcement/2.2 Security Templates/SANS OnDemand_2.WEBM 4MB
  233. Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_5.WEBM 4MB
  234. Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_12.WEBM 4MB
  235. Section 5 Endpoint Protection and Pre-Forensics/5.4 Firewall and IPSec Endpoint Automation/SANS OnDemand_6.WEBM 4MB
  236. Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_11.WEBM 4MB
  237. Section 5 Endpoint Protection and Pre-Forensics/5.5 Anti-Exploit Techniques/SANS OnDemand_10.WEBM 4MB
  238. Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_13.WEBM 4MB
  239. Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_5.WEBM 4MB
  240. Section 2 Continuous Secure Configarion Enforcement/2.2 Security Templates/SANS OnDemand_11.WEBM 4MB
  241. Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_30.WEBM 4MB
  242. Section 1 PowerShell Automation and Security/1.5 Writing Your Own Functions and Scripts/SANS OnDemand_12.WEBM 4MB
  243. Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_16.WEBM 4MB
  244. Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_13.WEBM 4MB
  245. Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_9.WEBM 4MB
  246. Section 5 Endpoint Protection and Pre-Forensics/5.2 Host-Based Windows Firewalls/SANS OnDemand_12.WEBM 4MB
  247. Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_26.WEBM 4MB
  248. Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_7.WEBM 4MB
  249. Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_4.WEBM 4MB
  250. Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_3.WEBM 4MB
  251. Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_4.WEBM 3MB
  252. Section 1 PowerShell Automation and Security/1.2 PowerShell Overview and Tips/8.WEBM 3MB
  253. Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_19.WEBM 3MB
  254. Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_10.WEBM 3MB
  255. Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand_13.WEBM 3MB
  256. Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand.WEBM 3MB
  257. Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_6.WEBM 3MB
  258. Section 2 Continuous Secure Configarion Enforcement/2.4 Server Hardening for SecOps/SANS OnDemand_6.WEBM 3MB
  259. Section 1 PowerShell Automation and Security/1.3 Modules, Functions and PowerShell Remoting/SANS OnDemand_8.WEBM 3MB
  260. Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand_10.WEBM 3MB
  261. Section 5 Endpoint Protection and Pre-Forensics/5.6 Assume Breach With Pre-Forensics/SANS OnDemand_9.WEBM 3MB
  262. Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_8.WEBM 3MB
  263. Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_33.WEBM 3MB
  264. Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_21.WEBM 3MB
  265. Section 1 PowerShell Automation and Security/1.1 Introduction PowerShell Automation and Security/SANS OnDemand.WEBM 3MB
  266. Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_9.WEBM 3MB
  267. Section 5 Endpoint Protection and Pre-Forensics/5.4 Firewall and IPSec Endpoint Automation/SANS OnDemand_5.WEBM 3MB
  268. Section 5 Endpoint Protection and Pre-Forensics/5.4 Firewall and IPSec Endpoint Automation/SANS OnDemand.WEBM 3MB
  269. Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_6.WEBM 3MB
  270. Section 5 Endpoint Protection and Pre-Forensics/5.2 Host-Based Windows Firewalls/SANS OnDemand_4.WEBM 3MB
  271. Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_15.WEBM 3MB
  272. Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_10.WEBM 3MB
  273. Section 5 Endpoint Protection and Pre-Forensics/5.5 Anti-Exploit Techniques/SANS OnDemand_12.WEBM 3MB
  274. Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_8.WEBM 3MB
  275. Section 5 Endpoint Protection and Pre-Forensics/5.3 IPSec For Role-Based Port Control/SANS OnDemand_4.WEBM 2MB
  276. Section 2 Continuous Secure Configarion Enforcement/2.2 Security Templates/SANS OnDemand_7.WEBM 2MB
  277. Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand.WEBM 2MB
  278. Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_21.WEBM 2MB
  279. Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_16.WEBM 2MB
  280. Section 5 Endpoint Protection and Pre-Forensics/5.5 Anti-Exploit Techniques/SANS OnDemand_3.WEBM 2MB
  281. Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_16.WEBM 2MB
  282. Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_3.WEBM 2MB
  283. Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_17.WEBM 2MB
  284. Section 2 Continuous Secure Configarion Enforcement/2.2 Security Templates/SANS OnDemand_3.WEBM 2MB
  285. Section 4 Administrative Compromise and Privilege Management/4.4 Managing Administrative Privileges In Active Directory/SANS OnDemand_9.WEBM 2MB
  286. Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_22.WEBM 2MB
  287. Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_12.WEBM 2MB
  288. Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_3.WEBM 2MB
  289. Section 5 Endpoint Protection and Pre-Forensics/5.5 Anti-Exploit Techniques/SANS OnDemand_5.WEBM 2MB
  290. Section 1 PowerShell Automation and Security/1.5 Writing Your Own Functions and Scripts/SANS OnDemand_8.WEBM 2MB
  291. Section 4 Administrative Compromise and Privilege Management/4.4 Managing Administrative Privileges In Active Directory/SANS OnDemand_11.WEBM 2MB
  292. Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_3.WEBM 2MB
  293. Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_9.WEBM 2MB
  294. Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand.WEBM 1MB
  295. Section 2 Continuous Secure Configarion Enforcement/2.4 Server Hardening for SecOps/SANS OnDemand.WEBM 1MB
  296. Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand.WEBM 1MB
  297. Section 3 Windows PKI and Smart Cards/3.3 Installing Certificate Services/SANS OnDemand.WEBM 1MB
  298. Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_28.WEBM 1MB
  299. Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_15.WEBM 1MB
  300. Section 3 Windows PKI and Smart Cards/3.4 Private Key Security Best Practices/SANS OnDemand.WEBM 1MB
  301. Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_8.WEBM 1MB
  302. Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_18.WEBM 974KB
  303. Section 3 Windows PKI and Smart Cards/3.6 Smart Cards and TPMs/SANS OnDemand_6.WEBM 966KB
  304. Section 1 PowerShell Automation and Security/1.5 Writing Your Own Functions and Scripts/SANS OnDemand_2.WEBM 874KB
  305. Section 3 Windows PKI and Smart Cards/3.6 Smart Cards and TPMs/SANS OnDemand.WEBM 858KB
  306. Section 5 Endpoint Protection and Pre-Forensics/5.5 Anti-Exploit Techniques/SANS OnDemand.WEBM 855KB
  307. Section 1 PowerShell Automation and Security/1.5 Writing Your Own Functions and Scripts/SANS OnDemand.WEBM 799KB
  308. Section 5 Endpoint Protection and Pre-Forensics/5.6 Assume Breach With Pre-Forensics/SANS OnDemand.WEBM 766KB
  309. Section 5 Endpoint Protection and Pre-Forensics/5.2 Host-Based Windows Firewalls/SANS OnDemand_2.WEBM 725KB
  310. Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_2.WEBM 597KB
  311. Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand.WEBM 562KB
  312. Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_15.WEBM 535KB
  313. Section 1 PowerShell Automation and Security/1.2 PowerShell Overview and Tips/1.WEBM 504KB
  314. Section 5 Endpoint Protection and Pre-Forensics/5.5 Anti-Exploit Techniques/SANS OnDemand_14.WEBM 492KB
  315. Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_19.WEBM 471KB
  316. Section 6 Defensible Networking and Blue Team WMI/6.1 Introduction Defensible Networking and Blue Team WMI/SANS OnDemand.WEBM 449KB
  317. Section 5 Endpoint Protection and Pre-Forensics/5.3 IPSec For Role-Based Port Control/SANS OnDemand.WEBM 430KB
  318. Section 4 Administrative Compromise and Privilege Management/4.4 Managing Administrative Privileges In Active Directory/SANS OnDemand.WEBM 392KB
  319. Section 5 Endpoint Protection and Pre-Forensics/5.6 Assume Breach With Pre-Forensics/SANS OnDemand_10.WEBM 355KB
  320. Section 5 Endpoint Protection and Pre-Forensics/5.3 IPSec For Role-Based Port Control/SANS OnDemand_10.WEBM 282KB
  321. Section 5 Endpoint Protection and Pre-Forensics/5.3 IPSec For Role-Based Port Control/SANS OnDemand_9.WEBM 222KB
  322. Section 5 Endpoint Protection and Pre-Forensics/5.3 IPSec For Role-Based Port Control/SANS OnDemand_11.WEBM 204KB
  323. Section 2 Continuous Secure Configarion Enforcement/2.1 Introduction Continuous Secure Configuration Enforcement/SANS OnDemand.WEBM 193KB
  324. Section 5 Endpoint Protection and Pre-Forensics/5.1 Introduction Endpoint Protection and Pre-Forensics/SANS OnDemand.WEBM 171KB
  325. Section 1 PowerShell Automation and Security/1.2 PowerShell Overview and Tips/3.WEBM 116KB
  326. Section 1 PowerShell Automation and Security/1.2 PowerShell Overview and Tips/4.WEBM 94KB
  327. Section 3 Windows PKI and Smart Cards/3.5 Managing Your PKI/SANS OnDemand.WEBM 90KB
  328. Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_2.WEBM 90KB
  329. Section 4 Administrative Compromise and Privilege Management/4.1 Introduction Administrative Compromise and Privilege Management/SANS OnDemand.WEBM 89KB
  330. Section 1 PowerShell Automation and Security/1.3 Modules, Functions and PowerShell Remoting/SANS OnDemand.WEBM 80KB
  331. Section 3 Windows PKI and Smart Cards/3.1 Introduction Windows Public Key Infrastructures and Smart Cards/SANS OnDemand.WEBM 77KB
  332. Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_29.WEBM 68KB
  333. Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_24.WEBM 48KB
  334. Section 1 PowerShell Automation and Security/1.5 Writing Your Own Functions and Scripts/SANS OnDemand_14.WEBM 47KB