:Search:

Udemy Threat Detection in an Enterprise

Torrent:
Info Hash: 3883FB7BBF162CBAB29C2A023321C179CB72BAC9
Similar Posts:
Uploader: freecoursewb
Source: 1 Logo 1337x
Type: Tutorials
Images:
Udemy Threat Detection in an Enterprise
Language: English
Category: Other
Size: 1.5 GB
Added: Oct. 25, 2023, 6:37 a.m.
Peers: Seeders: 0, Leechers: 3 (Last updated: 11 months ago)
Tracker Data:
Tracker Seeders Leechers Completed
udp://open.stealth.si:80/announce 0 1 0
udp://exodus.desync.com:6969/announce 0 0 0
udp://tracker.cyberia.is:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.opentrackr.org:1337/announce 0 0 0
udp://tracker.torrent.eu.org:451/announce 0 0 0
udp://explodie.org:6969/announce 0 0 0
udp://tracker.birkenwald.de:6969/announce 0 1 0
udp://tracker.moeking.me:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://ipv4.tracker.harry.lu:80/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.tiny-vps.com:6969/announce 0 0 0
udp://tracker.therarbg.to:6969/announce 0 1 0
Files:
  1. Get Bonus Downloads Here.url 180 bytes
  2. 1. Instructor Introduction.mp4 10.5 MB
  3. 1. Instructor Introduction.srt 2.1 KB
  4. 2. About The Course.mp4 36.0 MB
  5. 2. About The Course.srt 10.9 KB
  6. 3. Set Up The Lab Environment.mp4 92.7 MB
  7. 3. Set Up The Lab Environment.srt 23.4 KB
  8. 3.1 S1L3 - Set Up The Lab Environment Documentation.txt 275 bytes
  9. 1. An Overview of the Modern Cyber Threat Landscape.mp4 227.9 MB
  10. 1. An Overview of the Modern Cyber Threat Landscape.srt 53.9 KB
  11. 1.1 S2L1 - An Overview of the Modern Cyber Threat Landscape Documentation.txt 377 bytes
  12. 2. Integrating Pre-Breach and Post-Breach Approaches to Mitigate Cyber Threats.mp4 40.5 MB
  13. 2. Integrating Pre-Breach and Post-Breach Approaches to Mitigate Cyber Threats.srt 12.9 KB
  14. 3. Comparing Signature-Based and Behavioral Heuristics Detection Methods.mp4 42.7 MB
  15. 3. Comparing Signature-Based and Behavioral Heuristics Detection Methods.srt 9.8 KB
  16. 4. Combating Threat Persistence.mp4 77.0 MB
  17. 4. Combating Threat Persistence.srt 16.1 KB
  18. 5. Section 1 Review Questions.html 188 bytes
  19. 1. Windows Event Forwarding and Intrusion Detection.mp4 53.2 MB
  20. 1. Windows Event Forwarding and Intrusion Detection.srt 17.9 KB
  21. 1.1 S3L1 - Windows Event Forwarding and Intrusion Detection Documentation.txt 192 bytes
  22. 2. Microsoft Advanced Threat Analytics.mp4 62.8 MB
  23. 2. Microsoft Advanced Threat Analytics.srt 22.6 KB
  24. 2.1 S3L2 - Microsoft Advanced Threat Analytics Documentation.txt 125 bytes
  25. 3. Microsoft Defender for Endpoint (Microsoft Defender Advanced Threat Protection).mp4 55.4 MB
  26. 3. Microsoft Defender for Endpoint (Microsoft Defender Advanced Threat Protection).srt 17.7 KB
  27. 3.1 S3L3 - Microsoft Defender Advanced Threat Protection Documentation.txt 221 bytes
  28. 4. Microsoft Enterprise Threat Detection.mp4 47.8 MB
  29. 4. Microsoft Enterprise Threat Detection.srt 11.5 KB
  30. 5. Microsoft Security Risk Detection.mp4 20.4 MB
  31. 5. Microsoft Security Risk Detection.srt 5.6 KB
  32. 6. Antimalware Scan Interface (AMSI).mp4 12.0 MB
  33. 6. Antimalware Scan Interface (AMSI).srt 3.5 KB
  34. 7. Logging and Auditing.mp4 45.8 MB
  35. 7. Logging and Auditing.srt 12.2 KB
  36. 7.1 S3L7 - Logging and Auditing Documentation.txt 98 bytes
  37. 8. Threat Detection Tools.mp4 33.4 MB
  38. 8. Threat Detection Tools.srt 8.9 KB
  39. 8.1 S3L8 - Threat Detection Tools Documentation.txt 155 bytes
  40. 9. Section 2 Review Questions.html 188 bytes
  41. 1. Microsoft Cloud App Security and O365 Cloud App Security.mp4 64.2 MB
  42. 1. Microsoft Cloud App Security and O365 Cloud App Security.srt 17.4 KB
  43. 1.1 S4L1 - Microsoft Cloud App Security and O365 Cloud App Security Documentation.txt 62 bytes
  44. 2. Microsoft Defender for O365 (former Office 365 Advanced Threat Protection).mp4 45.9 MB
  45. 2. Microsoft Defender for O365 (former Office 365 Advanced Threat Protection).srt 13.8 KB
  46. 3. Office 365 Threat Inteligence.mp4 28.4 MB
  47. 3. Office 365 Threat Inteligence.srt 8.2 KB
  48. 4. Azure Advanced Threat Detection.mp4 124.5 MB
  49. 4. Azure Advanced Threat Detection.srt 35.0 KB
  50. 5. Azure Logging and Auditing.mp4 24.1 MB
  51. 5. Azure Logging and Auditing.srt 6.5 KB
  52. 6. Microsoft Enterprise Mobility + Security (EMS).mp4 35.2 MB
  53. 6. Microsoft Enterprise Mobility + Security (EMS).srt 8.5 KB
  54. 7. Microsoft 365.mp4 13.1 MB
  55. 7. Microsoft 365.srt 6.5 KB
  56. 7.1 S4L6 - Microsoft 365 Documentation.txt 133 bytes
  57. 8. Section 3 Review Questions.html 188 bytes
  58. 1. Layered Machine Learning defenses in Windows Defender Antivirus.mp4 74.4 MB
  59. 1. Layered Machine Learning defenses in Windows Defender Antivirus.srt 18.7 KB
  60. 2. Detecting Persistent Threats using MDE (Microsoft Defender ATP).mp4 115.6 MB
  61. 2. Detecting Persistent Threats using MDE (Microsoft Defender ATP).srt 32.1 KB
  62. 3. Enterprise Threat Detection behavioral monitoring.mp4 37.3 MB
  63. 3. Enterprise Threat Detection behavioral monitoring.srt 9.8 KB
  64. 4. Microsoft comprehensive approach to cyber threat detection.mp4 72.8 MB
  65. 4. Microsoft comprehensive approach to cyber threat detection.srt 19.3 KB
  66. 5. Section 4 Review Questions.html 188 bytes
  67. 1. Hands-On Lab.html 192 bytes
  68. 1. Final Exam.html 188 bytes
  69. Bonus Resources.txt 357 bytes

Discussion