SANS505 PowerShell 2017
- 收录时间:2018-03-10 13:10:32
- 文件大小:6GB
- 下载次数:94
- 最近下载:2020-12-18 03:31:54
- 磁力链接:
-
文件列表
- Section 3 Windows PKI and Smart Cards/3.2 PKI Overview, Benefits and Tools/SANS OnDemand_6.WEBM 146MB
- SEC505.1 PowerShell Automation and Security.pdf 88MB
- SEC505.2 Continuous Secure Configuration Enforcement.pdf 86MB
- Section 3 Windows PKI and Smart Cards/3.3 Installing Certificate Services/SANS OnDemand_6.WEBM 85MB
- SEC505.4 Administrative Compromise and Privilege Management.pdf 84MB
- Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_5.WEBM 80MB
- SEC505.6 Defensible Networking and Blue Team WMI.pdf 79MB
- Section 5 Endpoint Protection and Pre-Forensics/5.2 Host-Based Windows Firewalls/SANS OnDemand_7.WEBM 74MB
- SEC505.5 Endpoint Protection and Pre-Forensics.pdf 73MB
- Section 3 Windows PKI and Smart Cards/3.5 Managing Your PKI/SANS OnDemand_3.WEBM 72MB
- SEC505.3 Windows PKI and Smart Cards.pdf 71MB
- Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_22.WEBM 67MB
- Section 5 Endpoint Protection and Pre-Forensics/5.3 IPSec For Role-Based Port Control/SANS OnDemand_8.WEBM 67MB
- Section 3 Windows PKI and Smart Cards/3.4 Private Key Security Best Practices/SANS OnDemand_2.WEBM 66MB
- Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_7.WEBM 66MB
- Section 3 Windows PKI and Smart Cards/3.2 PKI Overview, Benefits and Tools/SANS OnDemand_3.WEBM 57MB
- Section 5 Endpoint Protection and Pre-Forensics/5.2 Host-Based Windows Firewalls/SANS OnDemand_8.WEBM 57MB
- Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_7.WEBM 56MB
- Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_17.WEBM 54MB
- Section 3 Windows PKI and Smart Cards/3.2 PKI Overview, Benefits and Tools/SANS OnDemand_7.WEBM 52MB
- Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand_6.WEBM 52MB
- Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_29.WEBM 51MB
- Section 3 Windows PKI and Smart Cards/3.5 Managing Your PKI/SANS OnDemand_5.WEBM 51MB
- Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_24.WEBM 51MB
- Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand_12.WEBM 51MB
- Section 3 Windows PKI and Smart Cards/3.3 Installing Certificate Services/SANS OnDemand_7.WEBM 51MB
- Section 3 Windows PKI and Smart Cards/3.3 Installing Certificate Services/SANS OnDemand_2.WEBM 50MB
- Section 1 PowerShell Automation and Security/1.2 PowerShell Overview and Tips/6.WEBM 50MB
- Section 3 Windows PKI and Smart Cards/3.6 Smart Cards and TPMs/SANS OnDemand_2.WEBM 48MB
- Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_26.WEBM 48MB
- Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand_11.WEBM 48MB
- Section 4 Administrative Compromise and Privilege Management/4.4 Managing Administrative Privileges In Active Directory/SANS OnDemand_3.WEBM 46MB
- Section 3 Windows PKI and Smart Cards/3.5 Managing Your PKI/SANS OnDemand_2.WEBM 46MB
- Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_28.WEBM 45MB
- Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_11.WEBM 45MB
- Learn.Windows.PowerShell.in.a.Month.of.Lunches.3rd.pdf 41MB
- Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_17.WEBM 41MB
- Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_15.WEBM 40MB
- Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_27.WEBM 40MB
- Section 1 PowerShell Automation and Security/1.1 Introduction PowerShell Automation and Security/SANS OnDemand_2.WEBM 39MB
- Section 5 Endpoint Protection and Pre-Forensics/5.3 IPSec For Role-Based Port Control/SANS OnDemand_12.WEBM 39MB
- Section 3 Windows PKI and Smart Cards/3.5 Managing Your PKI/SANS OnDemand_8.WEBM 39MB
- Section 3 Windows PKI and Smart Cards/3.2 PKI Overview, Benefits and Tools/SANS OnDemand_9.WEBM 39MB
- Section 3 Windows PKI and Smart Cards/3.6 Smart Cards and TPMs/SANS OnDemand_5.WEBM 38MB
- Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_18.WEBM 38MB
- Section 1 PowerShell Automation and Security/1.2 PowerShell Overview and Tips/2.WEBM 37MB
- Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_5.WEBM 36MB
- Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_21.WEBM 36MB
- Section 1 PowerShell Automation and Security/1.3 Modules, Functions and PowerShell Remoting/SANS OnDemand_3.WEBM 36MB
- Section 3 Windows PKI and Smart Cards/3.5 Managing Your PKI/SANS OnDemand_4.WEBM 36MB
- Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_25.WEBM 35MB
- Section 1 PowerShell Automation and Security/1.5 Writing Your Own Functions and Scripts/SANS OnDemand_13.WEBM 35MB
- Section 5 Endpoint Protection and Pre-Forensics/5.2 Host-Based Windows Firewalls/SANS OnDemand_11.WEBM 34MB
- Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_23.WEBM 34MB
- Section 3 Windows PKI and Smart Cards/3.3 Installing Certificate Services/SANS OnDemand_8.WEBM 34MB
- Section 3 Windows PKI and Smart Cards/3.5 Managing Your PKI/SANS OnDemand_7.WEBM 34MB
- Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_19.WEBM 33MB
- Section 3 Windows PKI and Smart Cards/3.2 PKI Overview, Benefits and Tools/SANS OnDemand_4.WEBM 33MB
- Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_12.WEBM 33MB
- Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand_8.WEBM 32MB
- Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_4.WEBM 32MB
- Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_13.WEBM 31MB
- Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand_4.WEBM 31MB
- Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand_15.WEBM 30MB
- Section 1 PowerShell Automation and Security/1.2 PowerShell Overview and Tips/7.WEBM 29MB
- Section 4 Administrative Compromise and Privilege Management/4.4 Managing Administrative Privileges In Active Directory/SANS OnDemand_6.WEBM 29MB
- Section 3 Windows PKI and Smart Cards/3.3 Installing Certificate Services/SANS OnDemand_5.WEBM 29MB
- Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_8.WEBM 29MB
- Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_26.WEBM 29MB
- Section 2 Continuous Secure Configarion Enforcement/2.2 Security Templates/SANS OnDemand_5.WEBM 29MB
- Section 1 PowerShell Automation and Security/1.2 PowerShell Overview and Tips/14.WEBM 29MB
- Section 3 Windows PKI and Smart Cards/3.2 PKI Overview, Benefits and Tools/SANS OnDemand_5.WEBM 28MB
- Section 5 Endpoint Protection and Pre-Forensics/5.6 Assume Breach With Pre-Forensics/SANS OnDemand_6.WEBM 28MB
- Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand_3.WEBM 28MB
- Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_16.WEBM 27MB
- Section 1 PowerShell Automation and Security/1.2 PowerShell Overview and Tips/9.WEBM 27MB
- Section 3 Windows PKI and Smart Cards/3.4 Private Key Security Best Practices/SANS OnDemand_4.WEBM 27MB
- Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_5.WEBM 27MB
- Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_27.WEBM 26MB
- Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand_7.WEBM 26MB
- Section 1 PowerShell Automation and Security/1.2 PowerShell Overview and Tips/13.WEBM 25MB
- Section 5 Endpoint Protection and Pre-Forensics/5.5 Anti-Exploit Techniques/SANS OnDemand_7.WEBM 25MB
- Section 2 Continuous Secure Configarion Enforcement/2.4 Server Hardening for SecOps/SANS OnDemand_5.WEBM 25MB
- Section 3 Windows PKI and Smart Cards/3.3 Installing Certificate Services/SANS OnDemand_4.WEBM 25MB
- Section 1 PowerShell Automation and Security/1.3 Modules, Functions and PowerShell Remoting/SANS OnDemand_10.WEBM 24MB
- Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand_9.WEBM 24MB
- Section 2 Continuous Secure Configarion Enforcement/2.2 Security Templates/SANS OnDemand_10.WEBM 24MB
- Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand.WEBM 24MB
- Section 1 PowerShell Automation and Security/1.3 Modules, Functions and PowerShell Remoting/SANS OnDemand_2.WEBM 24MB
- Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_13.WEBM 23MB
- Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_27.WEBM 23MB
- Section 5 Endpoint Protection and Pre-Forensics/5.5 Anti-Exploit Techniques/SANS OnDemand_6.WEBM 23MB
- Section 5 Endpoint Protection and Pre-Forensics/5.3 IPSec For Role-Based Port Control/SANS OnDemand_2.WEBM 23MB
- Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_6.WEBM 22MB
- Section 5 Endpoint Protection and Pre-Forensics/5.5 Anti-Exploit Techniques/SANS OnDemand_13.WEBM 22MB
- Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_4.WEBM 22MB
- Section 2 Continuous Secure Configarion Enforcement/2.4 Server Hardening for SecOps/SANS OnDemand_10.WEBM 22MB
- Section 1 PowerShell Automation and Security/1.2 PowerShell Overview and Tips/10.WEBM 22MB
- Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_17.WEBM 22MB
- Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_31.WEBM 21MB
- Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_12.WEBM 21MB
- Section 5 Endpoint Protection and Pre-Forensics/5.6 Assume Breach With Pre-Forensics/SANS OnDemand_4.WEBM 21MB
- Section 5 Endpoint Protection and Pre-Forensics/5.3 IPSec For Role-Based Port Control/SANS OnDemand_5.WEBM 21MB
- Section 2 Continuous Secure Configarion Enforcement/2.4 Server Hardening for SecOps/SANS OnDemand_4.WEBM 21MB
- Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_10.WEBM 20MB
- Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_23.WEBM 20MB
- Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_34.WEBM 20MB
- Section 1 PowerShell Automation and Security/1.3 Modules, Functions and PowerShell Remoting/SANS OnDemand_5.WEBM 20MB
- Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_21.WEBM 20MB
- Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_10.WEBM 20MB
- Section 2 Continuous Secure Configarion Enforcement/2.2 Security Templates/SANS OnDemand_8.WEBM 19MB
- Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_15.WEBM 19MB
- Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_12.WEBM 19MB
- Section 1 PowerShell Automation and Security/1.3 Modules, Functions and PowerShell Remoting/SANS OnDemand_9.WEBM 19MB
- Section 1 PowerShell Automation and Security/1.2 PowerShell Overview and Tips/5.WEBM 19MB
- Section 4 Administrative Compromise and Privilege Management/4.4 Managing Administrative Privileges In Active Directory/SANS OnDemand_5.WEBM 18MB
- Section 5 Endpoint Protection and Pre-Forensics/5.4 Firewall and IPSec Endpoint Automation/SANS OnDemand_3.WEBM 18MB
- Section 2 Continuous Secure Configarion Enforcement/2.4 Server Hardening for SecOps/SANS OnDemand_3.WEBM 18MB
- Section 3 Windows PKI and Smart Cards/3.2 PKI Overview, Benefits and Tools/SANS OnDemand.WEBM 18MB
- Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_4.WEBM 17MB
- Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_20.WEBM 17MB
- Section 5 Endpoint Protection and Pre-Forensics/5.3 IPSec For Role-Based Port Control/SANS OnDemand_3.WEBM 17MB
- Section 2 Continuous Secure Configarion Enforcement/2.4 Server Hardening for SecOps/SANS OnDemand_9.WEBM 16MB
- Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_16.WEBM 16MB
- Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_19.WEBM 16MB
- Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_19.WEBM 16MB
- Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_16.WEBM 16MB
- Section 5 Endpoint Protection and Pre-Forensics/5.2 Host-Based Windows Firewalls/SANS OnDemand_3.WEBM 16MB
- Section 1 PowerShell Automation and Security/1.5 Writing Your Own Functions and Scripts/SANS OnDemand_9.WEBM 15MB
- Section 2 Continuous Secure Configarion Enforcement/2.2 Security Templates/SANS OnDemand_4.WEBM 15MB
- Section 5 Endpoint Protection and Pre-Forensics/5.4 Firewall and IPSec Endpoint Automation/SANS OnDemand_4.WEBM 15MB
- Section 2 Continuous Secure Configarion Enforcement/2.4 Server Hardening for SecOps/SANS OnDemand_7.WEBM 15MB
- Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_15.WEBM 15MB
- Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_8.WEBM 15MB
- Section 5 Endpoint Protection and Pre-Forensics/5.5 Anti-Exploit Techniques/SANS OnDemand_11.WEBM 14MB
- Section 5 Endpoint Protection and Pre-Forensics/5.2 Host-Based Windows Firewalls/SANS OnDemand_6.WEBM 14MB
- Section 5 Endpoint Protection and Pre-Forensics/5.5 Anti-Exploit Techniques/SANS OnDemand_4.WEBM 14MB
- Section 5 Endpoint Protection and Pre-Forensics/5.5 Anti-Exploit Techniques/SANS OnDemand_2.WEBM 14MB
- Section 3 Windows PKI and Smart Cards/3.4 Private Key Security Best Practices/SANS OnDemand_3.WEBM 14MB
- Section 5 Endpoint Protection and Pre-Forensics/5.6 Assume Breach With Pre-Forensics/SANS OnDemand_8.WEBM 13MB
- Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_24.WEBM 13MB
- Section 1 PowerShell Automation and Security/1.5 Writing Your Own Functions and Scripts/SANS OnDemand_11.WEBM 13MB
- Section 5 Endpoint Protection and Pre-Forensics/5.6 Assume Breach With Pre-Forensics/SANS OnDemand_7.WEBM 12MB
- Section 5 Endpoint Protection and Pre-Forensics/5.2 Host-Based Windows Firewalls/SANS OnDemand_5.WEBM 12MB
- Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand_14.WEBM 12MB
- Section 1 PowerShell Automation and Security/1.2 PowerShell Overview and Tips/12.WEBM 12MB
- Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_35.WEBM 12MB
- Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_20.WEBM 11MB
- Section 3 Windows PKI and Smart Cards/3.3 Installing Certificate Services/SANS OnDemand_3.WEBM 11MB
- Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_22.WEBM 11MB
- Section 4 Administrative Compromise and Privilege Management/4.4 Managing Administrative Privileges In Active Directory/SANS OnDemand_7.WEBM 11MB
- Section 3 Windows PKI and Smart Cards/3.6 Smart Cards and TPMs/SANS OnDemand_4.WEBM 11MB
- Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_10.WEBM 11MB
- windows-powershell-action-3rd.pdf 11MB
- Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_14.WEBM 11MB
- Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_2.WEBM 11MB
- Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_11.WEBM 10MB
- Section 1 PowerShell Automation and Security/1.5 Writing Your Own Functions and Scripts/SANS OnDemand_7.WEBM 10MB
- Section 2 Continuous Secure Configarion Enforcement/2.4 Server Hardening for SecOps/SANS OnDemand_11.WEBM 10MB
- Section 5 Endpoint Protection and Pre-Forensics/5.6 Assume Breach With Pre-Forensics/SANS OnDemand_3.WEBM 10MB
- Section 1 PowerShell Automation and Security/1.5 Writing Your Own Functions and Scripts/SANS OnDemand_6.WEBM 10MB
- Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_14.WEBM 10MB
- Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_18.WEBM 10MB
- Section 5 Endpoint Protection and Pre-Forensics/5.6 Assume Breach With Pre-Forensics/SANS OnDemand_5.WEBM 10MB
- Section 1 PowerShell Automation and Security/1.3 Modules, Functions and PowerShell Remoting/SANS OnDemand_4.WEBM 10MB
- Section 5 Endpoint Protection and Pre-Forensics/5.3 IPSec For Role-Based Port Control/SANS OnDemand_6.WEBM 10MB
- Section 1 PowerShell Automation and Security/1.5 Writing Your Own Functions and Scripts/SANS OnDemand_4.WEBM 10MB
- Section 3 Windows PKI and Smart Cards/3.5 Managing Your PKI/SANS OnDemand_6.WEBM 9MB
- Section 1 PowerShell Automation and Security/1.2 PowerShell Overview and Tips/11.WEBM 9MB
- Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand_16.WEBM 9MB
- Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_11.WEBM 9MB
- Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_36.WEBM 9MB
- Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_11.WEBM 9MB
- Section 5 Endpoint Protection and Pre-Forensics/5.2 Host-Based Windows Firewalls/SANS OnDemand_10.WEBM 9MB
- Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_6.WEBM 9MB
- Section 5 Endpoint Protection and Pre-Forensics/5.3 IPSec For Role-Based Port Control/SANS OnDemand_7.WEBM 9MB
- Section 2 Continuous Secure Configarion Enforcement/2.2 Security Templates/SANS OnDemand_9.WEBM 9MB
- Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_6.WEBM 9MB
- Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_18.WEBM 9MB
- Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_17.WEBM 9MB
- Section 4 Administrative Compromise and Privilege Management/4.4 Managing Administrative Privileges In Active Directory/SANS OnDemand_10.WEBM 9MB
- Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_2.WEBM 8MB
- Section 5 Endpoint Protection and Pre-Forensics/5.5 Anti-Exploit Techniques/SANS OnDemand_9.WEBM 8MB
- Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_13.WEBM 8MB
- Section 5 Endpoint Protection and Pre-Forensics/5.6 Assume Breach With Pre-Forensics/SANS OnDemand_2.WEBM 8MB
- Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_3.WEBM 8MB
- Section 4 Administrative Compromise and Privilege Management/4.4 Managing Administrative Privileges In Active Directory/SANS OnDemand_8.WEBM 8MB
- Section 1 PowerShell Automation and Security/1.5 Writing Your Own Functions and Scripts/SANS OnDemand_10.WEBM 8MB
- Section 1 PowerShell Automation and Security/1.3 Modules, Functions and PowerShell Remoting/SANS OnDemand_11.WEBM 7MB
- Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_37.WEBM 7MB
- Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_24.WEBM 7MB
- Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_14.WEBM 7MB
- Section 2 Continuous Secure Configarion Enforcement/2.4 Server Hardening for SecOps/SANS OnDemand_2.WEBM 7MB
- Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_23.WEBM 7MB
- Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_9.WEBM 7MB
- Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_20.WEBM 7MB
- Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand_2.WEBM 7MB
- Section 4 Administrative Compromise and Privilege Management/4.4 Managing Administrative Privileges In Active Directory/SANS OnDemand_4.WEBM 7MB
- Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_25.WEBM 7MB
- Section 3 Windows PKI and Smart Cards/3.2 PKI Overview, Benefits and Tools/SANS OnDemand_2.WEBM 7MB
- Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_9.WEBM 7MB
- Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_38.WEBM 7MB
- Section 5 Endpoint Protection and Pre-Forensics/5.2 Host-Based Windows Firewalls/SANS OnDemand.WEBM 7MB
- Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_23.WEBM 6MB
- Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_2.WEBM 6MB
- Section 5 Endpoint Protection and Pre-Forensics/5.5 Anti-Exploit Techniques/SANS OnDemand_8.WEBM 6MB
- Section 4 Administrative Compromise and Privilege Management/4.4 Managing Administrative Privileges In Active Directory/SANS OnDemand_2.WEBM 6MB
- Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_14.WEBM 6MB
- Section 3 Windows PKI and Smart Cards/3.6 Smart Cards and TPMs/SANS OnDemand_3.WEBM 6MB
- Section 1 PowerShell Automation and Security/1.3 Modules, Functions and PowerShell Remoting/SANS OnDemand_7.WEBM 6MB
- Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_13.WEBM 6MB
- Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_12.WEBM 6MB
- Section 5 Endpoint Protection and Pre-Forensics/5.4 Firewall and IPSec Endpoint Automation/SANS OnDemand_2.WEBM 6MB
- Section 2 Continuous Secure Configarion Enforcement/2.4 Server Hardening for SecOps/SANS OnDemand_8.WEBM 6MB
- Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand_5.WEBM 6MB
- Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_17.WEBM 6MB
- Section 2 Continuous Secure Configarion Enforcement/2.2 Security Templates/SANS OnDemand_6.WEBM 6MB
- Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_7.WEBM 6MB
- Section 1 PowerShell Automation and Security/1.5 Writing Your Own Functions and Scripts/SANS OnDemand_3.WEBM 5MB
- Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_18.WEBM 5MB
- Section 5 Endpoint Protection and Pre-Forensics/5.2 Host-Based Windows Firewalls/SANS OnDemand_9.WEBM 5MB
- Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_20.WEBM 5MB
- Section 1 PowerShell Automation and Security/1.5 Writing Your Own Functions and Scripts/SANS OnDemand_5.WEBM 5MB
- Section 1 PowerShell Automation and Security/1.3 Modules, Functions and PowerShell Remoting/SANS OnDemand_6.WEBM 5MB
- Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_14.WEBM 5MB
- Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_22.WEBM 5MB
- Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_14.WEBM 5MB
- Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_32.WEBM 5MB
- Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_25.WEBM 5MB
- Section 3 Windows PKI and Smart Cards/3.2 PKI Overview, Benefits and Tools/SANS OnDemand_8.WEBM 5MB
- Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_7.WEBM 5MB
- Section 2 Continuous Secure Configarion Enforcement/2.2 Security Templates/SANS OnDemand_2.WEBM 4MB
- Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_5.WEBM 4MB
- Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_12.WEBM 4MB
- Section 5 Endpoint Protection and Pre-Forensics/5.4 Firewall and IPSec Endpoint Automation/SANS OnDemand_6.WEBM 4MB
- Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_11.WEBM 4MB
- Section 5 Endpoint Protection and Pre-Forensics/5.5 Anti-Exploit Techniques/SANS OnDemand_10.WEBM 4MB
- Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_13.WEBM 4MB
- Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_5.WEBM 4MB
- Section 2 Continuous Secure Configarion Enforcement/2.2 Security Templates/SANS OnDemand_11.WEBM 4MB
- Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_30.WEBM 4MB
- Section 1 PowerShell Automation and Security/1.5 Writing Your Own Functions and Scripts/SANS OnDemand_12.WEBM 4MB
- Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_16.WEBM 4MB
- Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_13.WEBM 4MB
- Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_9.WEBM 4MB
- Section 5 Endpoint Protection and Pre-Forensics/5.2 Host-Based Windows Firewalls/SANS OnDemand_12.WEBM 4MB
- Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_26.WEBM 4MB
- Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_7.WEBM 4MB
- Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_4.WEBM 4MB
- Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_3.WEBM 4MB
- Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_4.WEBM 3MB
- Section 1 PowerShell Automation and Security/1.2 PowerShell Overview and Tips/8.WEBM 3MB
- Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_19.WEBM 3MB
- Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_10.WEBM 3MB
- Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand_13.WEBM 3MB
- Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand.WEBM 3MB
- Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_6.WEBM 3MB
- Section 2 Continuous Secure Configarion Enforcement/2.4 Server Hardening for SecOps/SANS OnDemand_6.WEBM 3MB
- Section 1 PowerShell Automation and Security/1.3 Modules, Functions and PowerShell Remoting/SANS OnDemand_8.WEBM 3MB
- Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand_10.WEBM 3MB
- Section 5 Endpoint Protection and Pre-Forensics/5.6 Assume Breach With Pre-Forensics/SANS OnDemand_9.WEBM 3MB
- Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_8.WEBM 3MB
- Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_33.WEBM 3MB
- Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_21.WEBM 3MB
- Section 1 PowerShell Automation and Security/1.1 Introduction PowerShell Automation and Security/SANS OnDemand.WEBM 3MB
- Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_9.WEBM 3MB
- Section 5 Endpoint Protection and Pre-Forensics/5.4 Firewall and IPSec Endpoint Automation/SANS OnDemand_5.WEBM 3MB
- Section 5 Endpoint Protection and Pre-Forensics/5.4 Firewall and IPSec Endpoint Automation/SANS OnDemand.WEBM 3MB
- Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_6.WEBM 3MB
- Section 5 Endpoint Protection and Pre-Forensics/5.2 Host-Based Windows Firewalls/SANS OnDemand_4.WEBM 3MB
- Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_15.WEBM 3MB
- Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_10.WEBM 3MB
- Section 5 Endpoint Protection and Pre-Forensics/5.5 Anti-Exploit Techniques/SANS OnDemand_12.WEBM 3MB
- Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_8.WEBM 3MB
- Section 5 Endpoint Protection and Pre-Forensics/5.3 IPSec For Role-Based Port Control/SANS OnDemand_4.WEBM 2MB
- Section 2 Continuous Secure Configarion Enforcement/2.2 Security Templates/SANS OnDemand_7.WEBM 2MB
- Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand.WEBM 2MB
- Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_21.WEBM 2MB
- Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_16.WEBM 2MB
- Section 5 Endpoint Protection and Pre-Forensics/5.5 Anti-Exploit Techniques/SANS OnDemand_3.WEBM 2MB
- Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_16.WEBM 2MB
- Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_3.WEBM 2MB
- Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_17.WEBM 2MB
- Section 2 Continuous Secure Configarion Enforcement/2.2 Security Templates/SANS OnDemand_3.WEBM 2MB
- Section 4 Administrative Compromise and Privilege Management/4.4 Managing Administrative Privileges In Active Directory/SANS OnDemand_9.WEBM 2MB
- Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_22.WEBM 2MB
- Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_12.WEBM 2MB
- Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_3.WEBM 2MB
- Section 5 Endpoint Protection and Pre-Forensics/5.5 Anti-Exploit Techniques/SANS OnDemand_5.WEBM 2MB
- Section 1 PowerShell Automation and Security/1.5 Writing Your Own Functions and Scripts/SANS OnDemand_8.WEBM 2MB
- Section 4 Administrative Compromise and Privilege Management/4.4 Managing Administrative Privileges In Active Directory/SANS OnDemand_11.WEBM 2MB
- Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_3.WEBM 2MB
- Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_9.WEBM 2MB
- Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand.WEBM 1MB
- Section 2 Continuous Secure Configarion Enforcement/2.4 Server Hardening for SecOps/SANS OnDemand.WEBM 1MB
- Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand.WEBM 1MB
- Section 3 Windows PKI and Smart Cards/3.3 Installing Certificate Services/SANS OnDemand.WEBM 1MB
- Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_28.WEBM 1MB
- Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_15.WEBM 1MB
- Section 3 Windows PKI and Smart Cards/3.4 Private Key Security Best Practices/SANS OnDemand.WEBM 1MB
- Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_8.WEBM 1MB
- Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_18.WEBM 974KB
- Section 3 Windows PKI and Smart Cards/3.6 Smart Cards and TPMs/SANS OnDemand_6.WEBM 966KB
- Section 1 PowerShell Automation and Security/1.5 Writing Your Own Functions and Scripts/SANS OnDemand_2.WEBM 874KB
- Section 3 Windows PKI and Smart Cards/3.6 Smart Cards and TPMs/SANS OnDemand.WEBM 858KB
- Section 5 Endpoint Protection and Pre-Forensics/5.5 Anti-Exploit Techniques/SANS OnDemand.WEBM 855KB
- Section 1 PowerShell Automation and Security/1.5 Writing Your Own Functions and Scripts/SANS OnDemand.WEBM 799KB
- Section 5 Endpoint Protection and Pre-Forensics/5.6 Assume Breach With Pre-Forensics/SANS OnDemand.WEBM 766KB
- Section 5 Endpoint Protection and Pre-Forensics/5.2 Host-Based Windows Firewalls/SANS OnDemand_2.WEBM 725KB
- Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_2.WEBM 597KB
- Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand.WEBM 562KB
- Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_15.WEBM 535KB
- Section 1 PowerShell Automation and Security/1.2 PowerShell Overview and Tips/1.WEBM 504KB
- Section 5 Endpoint Protection and Pre-Forensics/5.5 Anti-Exploit Techniques/SANS OnDemand_14.WEBM 492KB
- Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_19.WEBM 471KB
- Section 6 Defensible Networking and Blue Team WMI/6.1 Introduction Defensible Networking and Blue Team WMI/SANS OnDemand.WEBM 449KB
- Section 5 Endpoint Protection and Pre-Forensics/5.3 IPSec For Role-Based Port Control/SANS OnDemand.WEBM 430KB
- Section 4 Administrative Compromise and Privilege Management/4.4 Managing Administrative Privileges In Active Directory/SANS OnDemand.WEBM 392KB
- Section 5 Endpoint Protection and Pre-Forensics/5.6 Assume Breach With Pre-Forensics/SANS OnDemand_10.WEBM 355KB
- Section 5 Endpoint Protection and Pre-Forensics/5.3 IPSec For Role-Based Port Control/SANS OnDemand_10.WEBM 282KB
- Section 5 Endpoint Protection and Pre-Forensics/5.3 IPSec For Role-Based Port Control/SANS OnDemand_9.WEBM 222KB
- Section 5 Endpoint Protection and Pre-Forensics/5.3 IPSec For Role-Based Port Control/SANS OnDemand_11.WEBM 204KB
- Section 2 Continuous Secure Configarion Enforcement/2.1 Introduction Continuous Secure Configuration Enforcement/SANS OnDemand.WEBM 193KB
- Section 5 Endpoint Protection and Pre-Forensics/5.1 Introduction Endpoint Protection and Pre-Forensics/SANS OnDemand.WEBM 171KB
- Section 1 PowerShell Automation and Security/1.2 PowerShell Overview and Tips/3.WEBM 116KB
- Section 1 PowerShell Automation and Security/1.2 PowerShell Overview and Tips/4.WEBM 94KB
- Section 3 Windows PKI and Smart Cards/3.5 Managing Your PKI/SANS OnDemand.WEBM 90KB
- Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_2.WEBM 90KB
- Section 4 Administrative Compromise and Privilege Management/4.1 Introduction Administrative Compromise and Privilege Management/SANS OnDemand.WEBM 89KB
- Section 1 PowerShell Automation and Security/1.3 Modules, Functions and PowerShell Remoting/SANS OnDemand.WEBM 80KB
- Section 3 Windows PKI and Smart Cards/3.1 Introduction Windows Public Key Infrastructures and Smart Cards/SANS OnDemand.WEBM 77KB
- Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_29.WEBM 68KB
- Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_24.WEBM 48KB
- Section 1 PowerShell Automation and Security/1.5 Writing Your Own Functions and Scripts/SANS OnDemand_14.WEBM 47KB