SEC511 - Continuous Monitoring and Security Operations
Torrent Information
DetailsGlobal Parameters
Identification Hash
801551349D5128E4D81696D098B7A6F27B40934D
Community Trust & Feedback
Files (972)
SEC511 - Continuous Monitoring and Security Operations
972 files • 22.44 GB
USB 2020
1 files • 13.8 GB
Sec511 Virtual Machine.iso
SEC511 - Continuous Monitoring and Security Operations/USB 2020/Sec511 Virtual Machine.iso
VoD 2020
949 files • 7.01 GB
6. Capstone Design Detect Defend
3 files • 1.23 GB
1. Capstone Design Detect Defend
3 files • 1.23 GB
3. Section 6 Continuous Monitoring and Security Operations Capstone.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/6. Capstone Design Detect Defend/1. Capstone Design Detect Defend/3. Section 6 Continuous Monitoring and Security Operations Capstone.mp4
2. Capstone Overview.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/6. Capstone Design Detect Defend/1. Capstone Design Detect Defend/2. Capstone Overview.mp4
1. Section 6 Capstone Design Detect Defend.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/6. Capstone Design Detect Defend/1. Capstone Design Detect Defend/1. Section 6 Capstone Design Detect Defend.mp4
1. Current State Assessment SOCs and Security Architecture
178 files • 1.68 GB
1. Course Overview
24 files • 620.76 MB
24. SEC511 Workbook Initial Configuration and Connection.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/24. SEC511 Workbook Initial Configuration and Connection.mp4
20. SEC511 Course PortalWiki.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/20. SEC511 Course PortalWiki.mp4
1. Current State Assessment SOCs and Security Architecture.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/1. Current State Assessment SOCs and Security Architecture.mp4
4. Course Roadmap 1.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/4. Course Roadmap 1.mp4
14. Demos Exercises and the Capstone.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/14. Demos Exercises and the Capstone.mp4
19. Actionable Information Immediate Results.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/19. Actionable Information Immediate Results.mp4
12. Capstone NetWars.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/12. Capstone NetWars.mp4
16. Exercise EnvironmentLaptop Requirements.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/16. Exercise EnvironmentLaptop Requirements.mp4
13. StartJoin the Conversation.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/13. StartJoin the Conversation.mp4
6. Current State Assessment.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/6. Current State Assessment.mp4
9. Endpoint Security Architecture.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/9. Endpoint Security Architecture.mp4
18. Short Links.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/18. Short Links.mp4
7. Defensible Network Security Architecture.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/7. Defensible Network Security Architecture.mp4
8. Network Security Monitoring NSM.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/8. Network Security Monitoring NSM.mp4
11. CSM 2.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/11. CSM 2.mp4
10. Continuous Security Monitoring CSM.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/10. Continuous Security Monitoring CSM.mp4
2. Table of Contents 1.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/2. Table of Contents 1.mp4
15. Daily Immersive Cyber Challenges.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/15. Daily Immersive Cyber Challenges.mp4
17. Courseware Conventions.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/17. Courseware Conventions.mp4
23. Course Roadmap 2.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/23. Course Roadmap 2.mp4
5. Main Topics Covered in SEC511.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/5. Main Topics Covered in SEC511.mp4
22. SEC511 Portal Electronic Labs.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/22. SEC511 Portal Electronic Labs.mp4
21. SEC511 Portal Landing Page.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/21. SEC511 Portal Landing Page.mp4
3. Table of Contents 2.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/3. Table of Contents 2.mp4
5. Traditional Cyber Defense
16 files • 351.26 MB
12. Instructor Demo Security Onion.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/12. Instructor Demo Security Onion.mp4
16. SEC511 Workbook Detecting Traditional Attack Techniques.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/16. SEC511 Workbook Detecting Traditional Attack Techniques.mp4
6. Perimeter Focused.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/6. Perimeter Focused.mp4
8. DeviceDriven Security.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/8. DeviceDriven Security.mp4
7. Addresses Layer 34.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/7. Addresses Layer 34.mp4
9. Traditional Successes.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/9. Traditional Successes.mp4
5. Sanity Check Illustrated.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/5. Sanity Check Illustrated.mp4
3. PreventionOriented.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/3. PreventionOriented.mp4
4. Prevention Sanity Check.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/4. Prevention Sanity Check.mp4
2. Traditional Cyber Defense.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/2. Traditional Cyber Defense.mp4
1. Course Roadmap 1.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/1. Course Roadmap 1.mp4
10. Course Roadmap 2.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/10. Course Roadmap 2.mp4
15. Wireshark.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/15. Wireshark.mp4
14. The Sguil NSM Frontend.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/14. The Sguil NSM Frontend.mp4
11. Instructor Demo Exercise 11 and 5113 Preview.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/11. Instructor Demo Exercise 11 and 5113 Preview.mp4
13. Sguil.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/13. Sguil.mp4
13. Section One Summary
6 files • 170.1 MB
5. SEC511 Workbook Egress Analysis with Elastic Stack.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/13. Section One Summary/5. SEC511 Workbook Egress Analysis with Elastic Stack.mp4
4. Course Roadmap 2.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/13. Section One Summary/4. Course Roadmap 2.mp4
1. Course Roadmap 1.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/13. Section One Summary/1. Course Roadmap 1.mp4
3. Day 1 TLDR.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/13. Section One Summary/3. Day 1 TLDR.mp4
2. Day 1 Punch ListAction Items.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/13. Section One Summary/2. Day 1 Punch ListAction Items.mp4
6. SEC511 Daily NetWars.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/13. Section One Summary/6. SEC511 Daily NetWars.mp4
10. Modern Cyber Defense Principles
12 files • 89.18 MB
12. SEC511 Workbook Detecting Modern Attack Techniques.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/12. SEC511 Workbook Detecting Modern Attack Techniques.mp4
7. Traditional versus Modern C2.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/7. Traditional versus Modern C2.mp4
3. Presumption of Compromise.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/3. Presumption of Compromise.mp4
5. Proactive Detection Threat Hunting.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/5. Proactive Detection Threat Hunting.mp4
6. PostExploitation Focused.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/6. PostExploitation Focused.mp4
10. RiskInformed.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/10. RiskInformed.mp4
8. ResponseDriven.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/8. ResponseDriven.mp4
9. Layer 7 Aware.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/9. Layer 7 Aware.mp4
1. Course Roadmap 1.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/1. Course Roadmap 1.mp4
4. DetectionOriented.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/4. DetectionOriented.mp4
2. Modern Cyber Defense Principles.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/2. Modern Cyber Defense Principles.mp4
11. Course Roadmap 2.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/11. Course Roadmap 2.mp4
2. Current State Assessment
15 files • 90.06 MB
9. ThirdParty Detection.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/9. ThirdParty Detection.mp4
14. Also Beware of the Perfect Attacker Fallacy.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/14. Also Beware of the Perfect Attacker Fallacy.mp4
13. Beware of the Perfect Solution Fallacy.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/13. Beware of the Perfect Solution Fallacy.mp4
7. Ponemon Cost of a Data Breach.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/7. Ponemon Cost of a Data Breach.mp4
5. Verizon DBIR.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/5. Verizon DBIR.mp4
4. Mandiant MTrends.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/4. Mandiant MTrends.mp4
12. Quoting Rob Joyce .mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/12. Quoting Rob Joyce .mp4
8. Credential Compromise.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/8. Credential Compromise.mp4
11. Disrupting NationState Hackers.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/11. Disrupting NationState Hackers.mp4
10. Postmortem Detection.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/10. Postmortem Detection.mp4
2. Step 1 Admit There Is a Problem.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/2. Step 1 Admit There Is a Problem.mp4
6. Verizon DBIR on Detection.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/6. Verizon DBIR on Detection.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/1. Course Roadmap.mp4
3. Current State Industry Studies.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/3. Current State Industry Studies.mp4
15. Summary.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/15. Summary.mp4
7. ClientSide Attack Vectors
14 files • 77.25 MB
8. Know Thy Victim.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/8. Know Thy Victim.mp4
3. DBIR State of the Phish.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/3. DBIR State of the Phish.mp4
6. Phishing with Links.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/6. Phishing with Links.mp4
9. Malvertising.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/9. Malvertising.mp4
5. Attaching the Evil.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/5. Attaching the Evil.mp4
11. Lets Get Physical.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/11. Lets Get Physical.mp4
13. Minnows 1.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/13. Minnows 1.mp4
10. Watering Hole Attacks.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/10. Watering Hole Attacks.mp4
7. WebBased Delivery.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/7. WebBased Delivery.mp4
12. Mobile Small but Evil.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/12. Mobile Small but Evil.mp4
4. Malicious Emails.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/4. Malicious Emails.mp4
2. ClientSide Vectors.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/2. ClientSide Vectors.mp4
14. Minnows 2.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/14. Minnows 2.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/1. Course Roadmap.mp4
3. Adversarial Dominance
6 files • 22.98 MB
4. Definition of Winning.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/3. Adversarial Dominance/4. Definition of Winning.mp4
2. Fighting a Losing Battle.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/3. Adversarial Dominance/2. Fighting a Losing Battle.mp4
6. New Security Paradigm.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/3. Adversarial Dominance/6. New Security Paradigm.mp4
5. GoalOriented Defense.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/3. Adversarial Dominance/5. GoalOriented Defense.mp4
3. No End in Sight.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/3. Adversarial Dominance/3. No End in Sight.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/3. Adversarial Dominance/1. Course Roadmap.mp4
12. Security Operations Centers
21 files • 72.57 MB
7. People and Process Products.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/7. People and Process Products.mp4
11. Making the MSSP Manage YOUR Security Services.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/11. Making the MSSP Manage YOUR Security Services.mp4
12. Hidden OutSOC Costs.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/12. Hidden OutSOC Costs.mp4
6. Purpose of a SOC.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/6. Purpose of a SOC.mp4
10. Outsourcing the SOC.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/10. Outsourcing the SOC.mp4
19. Relationship to Cyber Defense.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/19. Relationship to Cyber Defense.mp4
15. SOC Employee Training.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/15. SOC Employee Training.mp4
8. Key SOC Roles.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/8. Key SOC Roles.mp4
18. Cortex.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/18. Cortex.mp4
9. Oh Yeah Drinking the Flavored Drink Mix.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/9. Oh Yeah Drinking the Flavored Drink Mix.mp4
5. Also Not a SOC.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/5. Also Not a SOC.mp4
13. DIY SOC.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/13. DIY SOC.mp4
21. SOC Sounds Like There Should Be a Book About That.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/21. SOC Sounds Like There Should Be a Book About That.mp4
14. InSOC.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/14. InSOC.mp4
3. Security Operations Centers SOC.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/3. Security Operations Centers SOC.mp4
17. TheHive.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/17. TheHive.mp4
16. Hybrid SOC.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/16. Hybrid SOC.mp4
2. Information Overload.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/2. Information Overload.mp4
20. SEC511 and Security Operations.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/20. SEC511 and Security Operations.mp4
4. Not a SOC.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/4. Not a SOC.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/1. Course Roadmap.mp4
4. Traditional Attack Techniques
12 files • 46 MB
10. Ransomware.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/10. Ransomware.mp4
4. ServiceSide Exploitation Illustrated.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/4. ServiceSide Exploitation Illustrated.mp4
11. CryptoLocker.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/11. CryptoLocker.mp4
6. Relatively Benign Malware.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/6. Relatively Benign Malware.mp4
5. ServiceSide Traditionaland Current.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/5. ServiceSide Traditionaland Current.mp4
8. Advanced Denial of Service.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/8. Advanced Denial of Service.mp4
7. HighVolume Compromise.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/7. HighVolume Compromise.mp4
3. ServiceSide Exploitation.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/3. ServiceSide Exploitation.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/1. Course Roadmap.mp4
2. OpportunisticHobbyist Attackers.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/2. OpportunisticHobbyist Attackers.mp4
9. Bots Gone Wild.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/9. Bots Gone Wild.mp4
12. Cryptolocker Screenshot.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/12. Cryptolocker Screenshot.mp4
11. Adversary Informed Detection
18 files • 67.28 MB
11. Command and Control.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/11. Command and Control.mp4
14. The Other MS PSExec ExploitPersistC2Exfil.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/14. The Other MS PSExec ExploitPersistC2Exfil.mp4
10. Mandiant MTrends Example C2 via HTTP POST.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/10. Mandiant MTrends Example C2 via HTTP POST.mp4
6. Kill Chain ATTCK.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/6. Kill Chain ATTCK.mp4
17. Default Egress Deny.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/17. Default Egress Deny.mp4
5. Kill Chain Phases.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/5. Kill Chain Phases.mp4
9. Stage 2 and Persistence Visibility.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/9. Stage 2 and Persistence Visibility.mp4
3. Threat Intelligence.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/3. Threat Intelligence.mp4
16. Data Exfiltration Analysis.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/16. Data Exfiltration Analysis.mp4
8. PostExploitation Visibility Analysis.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/8. PostExploitation Visibility Analysis.mp4
13. Mandiant MTrends on MetasploitPSExec.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/13. Mandiant MTrends on MetasploitPSExec.mp4
18. Outbound Blocking FTW.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/18. Outbound Blocking FTW.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/1. Course Roadmap.mp4
12. Pivoting Lateral Movement Analysis.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/12. Pivoting Lateral Movement Analysis.mp4
2. Adversary Informed Detection.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/2. Adversary Informed Detection.mp4
15. Data Analysis.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/15. Data Analysis.mp4
7. PostExploitation Activity Is Key.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/7. PostExploitation Activity Is Key.mp4
4. Intrusion Kill Chain.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/4. Intrusion Kill Chain.mp4
9. PostExploitation
16 files • 49.85 MB
15. Shell Meterpreter.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/15. Shell Meterpreter.mp4
10. Pivoting Pictorially 4.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/10. Pivoting Pictorially 4.mp4
6. Lateral Movement.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/6. Lateral Movement.mp4
13. Hiding.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/13. Hiding.mp4
9. Pivoting Pictorially 3.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/9. Pivoting Pictorially 3.mp4
12. Persistence.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/12. Persistence.mp4
7. Pivoting Pictorially 1.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/7. Pivoting Pictorially 1.mp4
16. Meterpreter Open Source Payload Capabilities.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/16. Meterpreter Open Source Payload Capabilities.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/1. Course Roadmap.mp4
4. Exfiltration.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/4. Exfiltration.mp4
14. Persistence versus Hiding.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/14. Persistence versus Hiding.mp4
2. Advanced PostExploitation.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/2. Advanced PostExploitation.mp4
11. C2CCCNC.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/11. C2CCCNC.mp4
5. Encryptions Effects on Exfiltration.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/5. Encryptions Effects on Exfiltration.mp4
8. Pivoting Pictorially 2.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/8. Pivoting Pictorially 2.mp4
3. DataDriven.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/3. DataDriven.mp4
6. Modern Attack Techniques
9 files • 34.2 MB
6. ClientSide Exploitation Phishing Illustrated Part 1.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/6. Modern Attack Techniques/6. ClientSide Exploitation Phishing Illustrated Part 1.mp4
3. WellFunded Adversaries.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/6. Modern Attack Techniques/3. WellFunded Adversaries.mp4
2. Motivated Adversaries.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/6. Modern Attack Techniques/2. Motivated Adversaries.mp4
4. Web Application Attacks.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/6. Modern Attack Techniques/4. Web Application Attacks.mp4
5. Layer 8Social Engineering.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/6. Modern Attack Techniques/5. Layer 8Social Engineering.mp4
9. Why ClientSide Exploitation.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/6. Modern Attack Techniques/9. Why ClientSide Exploitation.mp4
8. ClientSide Exploitation Phishing Illustrated Part 3.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/6. Modern Attack Techniques/8. ClientSide Exploitation Phishing Illustrated Part 3.mp4
7. ClientSide Exploitation Phishing Illustrated Part 2.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/6. Modern Attack Techniques/7. ClientSide Exploitation Phishing Illustrated Part 2.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/6. Modern Attack Techniques/1. Course Roadmap.mp4
8. ClientSide Targets
9 files • 23.94 MB
7. Flash EndofLife in 2020.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/8. ClientSide Targets/7. Flash EndofLife in 2020.mp4
5. Browser Attacks without Exploits.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/8. ClientSide Targets/5. Browser Attacks without Exploits.mp4
4. Browser Attacks.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/8. ClientSide Targets/4. Browser Attacks.mp4
9. Maliciously Crafted Files.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/8. ClientSide Targets/9. Maliciously Crafted Files.mp4
6. Browser Plugin Exploits.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/8. ClientSide Targets/6. Browser Plugin Exploits.mp4
3. BrowserBased Exploitation.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/8. ClientSide Targets/3. BrowserBased Exploitation.mp4
2. Common ClientSide Targets.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/8. ClientSide Targets/2. Common ClientSide Targets.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/8. ClientSide Targets/1. Course Roadmap.mp4
8. File Format Attacks.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/1. Current State Assessment SOCs and Security Architecture/8. ClientSide Targets/8. File Format Attacks.mp4
3. Network Security Monitoring
190 files • 1009.23 MB
7. NSM Data Sources
28 files • 239.4 MB
28. SEC511 Workbook Pcap Strings and File Carving ZeekBro.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/28. SEC511 Workbook Pcap Strings and File Carving ZeekBro.mp4
19. Transaction Data Example.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/19. Transaction Data Example.mp4
8. Extracted Data.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/8. Extracted Data.mp4
15. Pcap Strings Example.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/15. Pcap Strings Example.mp4
9. Carving Files with Wireshark Step 1 Identify the File.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/9. Carving Files with Wireshark Step 1 Identify the File.mp4
13. Or Use ZeekBro.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/13. Or Use ZeekBro.mp4
12. Save the EXE Check the File Type Hash and Scan with Antivirus.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/12. Save the EXE Check the File Type Hash and Scan with Antivirus.mp4
4. Packet Data.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/4. Packet Data.mp4
16. Flow Data.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/16. Flow Data.mp4
14. String Data.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/14. String Data.mp4
22. Example Sguil IDS Alert.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/22. Example Sguil IDS Alert.mp4
5. Full Packet Capture.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/5. Full Packet Capture.mp4
7. Full Packet Capture Tools.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/7. Full Packet Capture Tools.mp4
11. Edit the File.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/11. Edit the File.mp4
24. SnortSourcefire Tagging Syntax.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/24. SnortSourcefire Tagging Syntax.mp4
2. NSM Data Sources 1.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/2. NSM Data Sources 1.mp4
17. Pcap Flow Example Using Tshark.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/17. Pcap Flow Example Using Tshark.mp4
6. Storage Required for Full Packet Capture.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/6. Storage Required for Full Packet Capture.mp4
23. Tagged Data.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/23. Tagged Data.mp4
10. Step 2 Choose the Conversation and Save As.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/10. Step 2 Choose the Conversation and Save As.mp4
18. Transaction Data.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/18. Transaction Data.mp4
21. Alert Data.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/21. Alert Data.mp4
26. Correlated Data.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/26. Correlated Data.mp4
20. Statistical Data.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/20. Statistical Data.mp4
25. Example of a Tagged Rule.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/25. Example of a Tagged Rule.mp4
3. NSM Data Sources 2.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/3. NSM Data Sources 2.mp4
27. Course Roadmap 2.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/27. Course Roadmap 2.mp4
1. Course Roadmap 1.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/1. Course Roadmap 1.mp4
9. Cornerstone NSM
8 files • 144.43 MB
8. SEC511 Workbook Sguil ServiceSide Analysis.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/9. Cornerstone NSM/8. SEC511 Workbook Sguil ServiceSide Analysis.mp4
5. ServiceSide Exploits.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/9. Cornerstone NSM/5. ServiceSide Exploits.mp4
3. ClientSide Exploits.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/9. Cornerstone NSM/3. ClientSide Exploits.mp4
6. ServiceSide Example.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/9. Cornerstone NSM/6. ServiceSide Example.mp4
1. Course Roadmap 1.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/9. Cornerstone NSM/1. Course Roadmap 1.mp4
7. Course Roadmap 2.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/9. Cornerstone NSM/7. Course Roadmap 2.mp4
4. ClientSide Example.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/9. Cornerstone NSM/4. ClientSide Example.mp4
2. Cornerstone NSM.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/9. Cornerstone NSM/2. Cornerstone NSM.mp4
15. SectionThree Summary
5 files • 105.82 MB
3. SEC511 Workbook 5113 Final Exercise.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/15. SectionThree Summary/3. SEC511 Workbook 5113 Final Exercise.mp4
2. Day 3 Punch ListAction Items.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/15. SectionThree Summary/2. Day 3 Punch ListAction Items.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/15. SectionThree Summary/1. Course Roadmap.mp4
5. Thank you.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/15. SectionThree Summary/5. Thank you.mp4
4. SEC511 Daily NetWars.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/15. SectionThree Summary/4. SEC511 Daily NetWars.mp4
1. Getting Started
5 files • 35.87 MB
3. Table of Contents 2.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/1. Getting Started/3. Table of Contents 2.mp4
2. Table of Contents 1.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/1. Getting Started/2. Table of Contents 1.mp4
5. A Note on Exercises.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/1. Getting Started/5. A Note on Exercises.mp4
1. Network Security Monitoring.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/1. Getting Started/1. Network Security Monitoring.mp4
4. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/1. Getting Started/4. Course Roadmap.mp4
4. The NSM Toolbox
18 files • 89.51 MB
17. Example Difference between SnortSuricata and ZeekBro.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/17. Example Difference between SnortSuricata and ZeekBro.mp4
11. Wireshark.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/11. Wireshark.mp4
9. Sguil in Action III.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/9. Sguil in Action III.mp4
8. Sguil in Action II.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/8. Sguil in Action II.mp4
12. Tshark.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/12. Tshark.mp4
7. Sguil in Action I.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/7. Sguil in Action I.mp4
5. Security Onion Included Software.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/5. Security Onion Included Software.mp4
3. NSM Distribution.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/3. NSM Distribution.mp4
10. NSM Toolbox Wireshark and Tshark.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/10. NSM Toolbox Wireshark and Tshark.mp4
18. NSM Toolbox SIEMs.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/18. NSM Toolbox SIEMs.mp4
6. NSMNIDS Frontends.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/6. NSMNIDS Frontends.mp4
14. Bro Zeek.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/14. Bro Zeek.mp4
4. Security Onion.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/4. Security Onion.mp4
15. Origin of Zeek.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/15. Origin of Zeek.mp4
16. ZeekBro Network Security Monitor.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/16. ZeekBro Network Security Monitor.mp4
2. The NSM Toolbox.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/2. The NSM Toolbox.mp4
13. NSM Toolbox NIDS.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/13. NSM Toolbox NIDS.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/1. Course Roadmap.mp4
2. Network Security Monitoring Overview
8 files • 41.43 MB
7. Good Hunting.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/2. Network Security Monitoring Overview/7. Good Hunting.mp4
3. What Is Continuous Security Monitoring.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/2. Network Security Monitoring Overview/3. What Is Continuous Security Monitoring.mp4
6. Form a Threating Hunting Team.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/2. Network Security Monitoring Overview/6. Form a Threating Hunting Team.mp4
8. Threat Hunting Team HowTo.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/2. Network Security Monitoring Overview/8. Threat Hunting Team HowTo.mp4
2. What Is Network Security Monitoring.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/2. Network Security Monitoring Overview/2. What Is Network Security Monitoring.mp4
5. Its More Complicated than Threats versus Vulnerabilities.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/2. Network Security Monitoring Overview/5. Its More Complicated than Threats versus Vulnerabilities.mp4
4. Richard Bejtlich NSM versus CSM.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/2. Network Security Monitoring Overview/4. Richard Bejtlich NSM versus CSM.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/2. Network Security Monitoring Overview/1. Course Roadmap.mp4
11. Identifying Command and Control Traffic
26 files • 101.29 MB
17. dnscat2 Wireshark View.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/17. dnscat2 Wireshark View.mp4
12. Whitecap One Approach to Detect Malicious ICMP.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/12. Whitecap One Approach to Detect Malicious ICMP.mp4
22. Iodine DNS Tunneling.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/22. Iodine DNS Tunneling.mp4
15. Zeus Botnet C2 via DNS.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/15. Zeus Botnet C2 via DNS.mp4
3. Malware Phones Home.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/3. Malware Phones Home.mp4
13. Spot the C2.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/13. Spot the C2.mp4
14. DNS The Ideal C2 Channel.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/14. DNS The Ideal C2 Channel.mp4
16. dnscat2 and Iodine.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/16. dnscat2 and Iodine.mp4
5. Persistent External Network Connections.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/5. Persistent External Network Connections.mp4
8. C2 Protocols.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/8. C2 Protocols.mp4
26. C2 POST Content.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/26. C2 POST Content.mp4
2. Identifying Command and Control Traffic.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/2. Identifying Command and Control Traffic.mp4
25. HTTP POST C2.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/25. HTTP POST C2.mp4
4. Unencrypted pLagUe Botnet C2 Traffic.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/4. Unencrypted pLagUe Botnet C2 Traffic.mp4
7. Three Categories Will Emerge.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/7. Three Categories Will Emerge.mp4
21. Iodine Raw Tunnel.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/21. Iodine Raw Tunnel.mp4
11. SSH Tunneled via ICMP.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/11. SSH Tunneled via ICMP.mp4
24. HTTP C2.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/24. HTTP C2.mp4
6. Inventory Persistent External Connections.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/6. Inventory Persistent External Connections.mp4
9. ICMP.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/9. ICMP.mp4
18. dnscat2 Whats Happening.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/18. dnscat2 Whats Happening.mp4
20. dnscat2 The Results.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/20. dnscat2 The Results.mp4
19. dnscat2 Spotting with ZeekBro.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/19. dnscat2 Spotting with ZeekBro.mp4
23. Iodine Show Me the NULL ZeekBro.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/23. Iodine Show Me the NULL ZeekBro.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/1. Course Roadmap.mp4
10. Wireshark ICMP Example.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/10. Wireshark ICMP Example.mp4
8. Practical NSM Issues
16 files • 50.74 MB
13. Sensor Placement.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/13. Sensor Placement.mp4
7. Mirror Ports.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/7. Mirror Ports.mp4
4. Security Onion ServerSensor Design.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/4. Security Onion ServerSensor Design.mp4
8. Network Taps.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/8. Network Taps.mp4
15. Practical Issues Time Zones and Daylight Saving Time.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/15. Practical Issues Time Zones and Daylight Saving Time.mp4
14. Practical Issues NTP.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/14. Practical Issues NTP.mp4
12. Umbrella Sensor.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/12. Umbrella Sensor.mp4
6. Hubs.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/6. Hubs.mp4
3. NSM Sensors and Servers.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/3. NSM Sensors and Servers.mp4
10. Sniffing Virtual Traffic.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/10. Sniffing Virtual Traffic.mp4
9. Port Overload.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/9. Port Overload.mp4
5. Practical Issues How to Sniff.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/5. Practical Issues How to Sniff.mp4
2. Practical NSM Issues.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/2. Practical NSM Issues.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/1. Course Roadmap.mp4
16. Spring Time Difference Between NYC London and Sydney 1.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/16. Spring Time Difference Between NYC London and Sydney 1.mp4
11. NSM Sensor Placement.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/11. NSM Sensor Placement.mp4
14. Tracking Encryption Certificates
9 files • 22.39 MB
7. Detecting Malware.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/14. Tracking Encryption Certificates/7. Detecting Malware.mp4
8. A Simple Approach to Detecting Malware via Certificates.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/14. Tracking Encryption Certificates/8. A Simple Approach to Detecting Malware via Certificates.mp4
4. Spot the Difference.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/14. Tracking Encryption Certificates/4. Spot the Difference.mp4
2. Tracking Encryption Certificates.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/14. Tracking Encryption Certificates/2. Tracking Encryption Certificates.mp4
5. Example X509 Certificate.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/14. Tracking Encryption Certificates/5. Example X509 Certificate.mp4
3. Public Key Certificates.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/14. Tracking Encryption Certificates/3. Public Key Certificates.mp4
6. Normal X509 issuer Fields.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/14. Tracking Encryption Certificates/6. Normal X509 issuer Fields.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/14. Tracking Encryption Certificates/1. Course Roadmap.mp4
9. Our Approach on the Contagio Crimeware Pcap Collection.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/14. Tracking Encryption Certificates/9. Our Approach on the Contagio Crimeware Pcap Collection.mp4
5. NIDS Design
13 files • 39.93 MB
9. Anomaly Detection.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/5. NIDS Design/9. Anomaly Detection.mp4
8. Protocol Behavior.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/5. NIDS Design/8. Protocol Behavior.mp4
12. Know Thy Network.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/5. NIDS Design/12. Know Thy Network.mp4
4. How Much Malware Is There.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/5. NIDS Design/4. How Much Malware Is There.mp4
3. Signature Matching.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/5. NIDS Design/3. Signature Matching.mp4
11. Detecting Specific Anomalies.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/5. NIDS Design/11. Detecting Specific Anomalies.mp4
6. How Difficult Is Signature Evasion.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/5. NIDS Design/6. How Difficult Is Signature Evasion.mp4
2. Fundamental NIDS Design.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/5. NIDS Design/2. Fundamental NIDS Design.mp4
5. Blacklisting Is a Failed Approach.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/5. NIDS Design/5. Blacklisting Is a Failed Approach.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/5. NIDS Design/1. Course Roadmap.mp4
10. Historical Anomaly Design.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/5. NIDS Design/10. Historical Anomaly Design.mp4
13. There Is No Easy Button.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/5. NIDS Design/13. There Is No Easy Button.mp4
7. Answer Not Many.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/5. NIDS Design/7. Answer Not Many.mp4
10. Tracking EXEs
17 files • 43.39 MB
17. Targeted AnomalyBased EXE Rule.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/17. Targeted AnomalyBased EXE Rule.mp4
8. What Is Wrong with This Picture.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/8. What Is Wrong with This Picture.mp4
6. Identifying Windows EXEs.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/6. Identifying Windows EXEs.mp4
4. Stage 2 EXE.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/4. Stage 2 EXE.mp4
13. How EXEs Should Not Move.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/13. How EXEs Should Not Move.mp4
7. This Program Must Be Run under Win32.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/7. This Program Must Be Run under Win32.mp4
11. Predictable Transfer of EXEs.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/11. Predictable Transfer of EXEs.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/1. Course Roadmap.mp4
5. Tracking EXEs 2.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/5. Tracking EXEs 2.mp4
2. Tracking EXEs 1.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/2. Tracking EXEs 1.mp4
12. Defensible Executable Transfers.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/12. Defensible Executable Transfers.mp4
10. CIS 12 Boundary Defense.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/10. CIS 12 Boundary Defense.mp4
14. NonDefensible and Suspicious Executable Flow.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/14. NonDefensible and Suspicious Executable Flow.mp4
3. Why Is This Important.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/3. Why Is This Important.mp4
16. AnomalyBased Detection Is Hard Right.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/16. AnomalyBased Detection Is Hard Right.mp4
9. Spot the Anomaly.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/9. Spot the Anomaly.mp4
15. Detecting Stage 2 Downloads.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/15. Detecting Stage 2 Downloads.mp4
12. Tracking User Agents
8 files • 24.15 MB
7. Our Approach on the Contagio Crimeware Pcap Collection.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/12. Tracking User Agents/7. Our Approach on the Contagio Crimeware Pcap Collection.mp4
5. Abnormal HTTP User Agents.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/12. Tracking User Agents/5. Abnormal HTTP User Agents.mp4
6. Tracking User Agents 2.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/12. Tracking User Agents/6. Tracking User Agents 2.mp4
4. Windows Versions in User Agent Strings.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/12. Tracking User Agents/4. Windows Versions in User Agent Strings.mp4
2. Tracking User Agents 1.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/12. Tracking User Agents/2. Tracking User Agents 1.mp4
3. Common User Agent Substrings.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/12. Tracking User Agents/3. Common User Agent Substrings.mp4
8. Another Method Identify the Shortest UserAgents.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/12. Tracking User Agents/8. Another Method Identify the Shortest UserAgents.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/12. Tracking User Agents/1. Course Roadmap.mp4
3. Evolution of NSM
12 files • 30.43 MB
6. DBIRMTrends Is Internal Detection Improving.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/6. DBIRMTrends Is Internal Detection Improving.mp4
7. Bejtlich South Carolina Department of Revenue DoR Case Study.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/7. Bejtlich South Carolina Department of Revenue DoR Case Study.mp4
8. Case Study NotPetya.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/8. Case Study NotPetya.mp4
12. Maersk Information Security Improvements.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/12. Maersk Information Security Improvements.mp4
3. The Tao of Network Security Monitoring.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/3. The Tao of Network Security Monitoring.mp4
2. Evolution of NSM.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/2. Evolution of NSM.mp4
5. Why Not Replace Detection with Prevention.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/5. Why Not Replace Detection with Prevention.mp4
9. NotPetya Financial Cost.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/9. NotPetya Financial Cost.mp4
4. NSM versus NIDS.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/4. NSM versus NIDS.mp4
11. NotPetya Effects on Maersk.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/11. NotPetya Effects on Maersk.mp4
10. NotPetya Effects on Ukraine.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/10. NotPetya Effects on Ukraine.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/1. Course Roadmap.mp4
6. Analysis Methodology
6 files • 21.26 MB
4. How This Applies to NSM.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/6. Analysis Methodology/4. How This Applies to NSM.mp4
2. Analysis Methodology.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/6. Analysis Methodology/2. Analysis Methodology.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/6. Analysis Methodology/1. Course Roadmap.mp4
3. Sherlock Holmes on Deduction.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/6. Analysis Methodology/3. Sherlock Holmes on Deduction.mp4
6. Dirty Word List.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/6. Analysis Methodology/6. Dirty Word List.mp4
5. NSM Analysis Methodology.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/6. Analysis Methodology/5. NSM Analysis Methodology.mp4
13. C2 via HTTPS
11 files • 19.19 MB
7. Normal HTTPS.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/13. C2 via HTTPS/7. Normal HTTPS.mp4
9. Follow TCP Stream.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/13. C2 via HTTPS/9. Follow TCP Stream.mp4
5. SSLTLS without HTTPS.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/13. C2 via HTTPS/5. SSLTLS without HTTPS.mp4
3. NonEncrypted HTTPS 1.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/13. C2 via HTTPS/3. NonEncrypted HTTPS 1.mp4
4. NonEncrypted HTTPS 2.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/13. C2 via HTTPS/4. NonEncrypted HTTPS 2.mp4
6. The HTTPS SSLTLS Handshake.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/13. C2 via HTTPS/6. The HTTPS SSLTLS Handshake.mp4
10. Tor C2.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/13. C2 via HTTPS/10. Tor C2.mp4
8. Malicious HTTPS.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/13. C2 via HTTPS/8. Malicious HTTPS.mp4
11. Tor HTTPS.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/13. C2 via HTTPS/11. Tor HTTPS.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/13. C2 via HTTPS/1. Course Roadmap.mp4
2. C2 via HTTPS.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/3. Network Security Monitoring/13. C2 via HTTPS/2. C2 via HTTPS.mp4
4. Endpoint Security Architecture
195 files • 1.12 GB
6. Application Monitoring and Sysmon
20 files • 250.76 MB
20. SEC511 Workbook Sysmon.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/20. SEC511 Workbook Sysmon.mp4
12. Example Sysmon XML Configuration.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/12. Example Sysmon XML Configuration.mp4
6. Meterpreter Payload Not So Normal.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/6. Meterpreter Payload Not So Normal.mp4
10. Sysmon Capabilities.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/10. Sysmon Capabilities.mp4
17. BeltandSuspenders Detective Whitelisting Process.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/17. BeltandSuspenders Detective Whitelisting Process.mp4
4. Security Event ID 4688.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/4. Security Event ID 4688.mp4
13. IMPHASH Hash.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/13. IMPHASH Hash.mp4
3. Log Full Command Line of All Processes.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/3. Log Full Command Line of All Processes.mp4
9. Sysmon Application Monitoring.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/9. Sysmon Application Monitoring.mp4
16. Detecting Unusual and Unsigned Drivers and Images with Sysmon.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/16. Detecting Unusual and Unsigned Drivers and Images with Sysmon.mp4
18. DeepWhite.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/18. DeepWhite.mp4
14. Sysmon Event Filtering.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/14. Sysmon Event Filtering.mp4
1. Course Roadmap 1.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/1. Course Roadmap 1.mp4
11. Sysmon Syntax.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/11. Sysmon Syntax.mp4
5. Command Lines to Look For.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/5. Command Lines to Look For.mp4
15. Sysmon Event Filtering II.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/15. Sysmon Event Filtering II.mp4
2. Application Monitoring.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/2. Application Monitoring.mp4
8. Microsoft Sysinternals Sysmon.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/8. Microsoft Sysinternals Sysmon.mp4
7. PowerShell Logging.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/7. PowerShell Logging.mp4
19. Course Roadmap 2.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/19. Course Roadmap 2.mp4
9. Privilege Monitoring
12 files • 139.92 MB
12. SEC511 Workbook Autoruns.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/12. SEC511 Workbook Autoruns.mp4
7. Key Privileges.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/7. Key Privileges.mp4
5. User Rights and Privileges.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/5. User Rights and Privileges.mp4
8. Persistence.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/8. Persistence.mp4
4. exploitwindowslocalservicepermissions.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/4. exploitwindowslocalservicepermissions.mp4
2. Privileged Account Monitoring.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/2. Privileged Account Monitoring.mp4
9. ASEPs.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/9. ASEPs.mp4
6. Key User Rights.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/6. Key User Rights.mp4
10. Autoruns.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/10. Autoruns.mp4
3. NTFS Permissions.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/3. NTFS Permissions.mp4
1. Course Roadmap 1.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/1. Course Roadmap 1.mp4
11. Course Roadmap 2.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/11. Course Roadmap 2.mp4
1. Endpoint Security Architecture Overview
7 files • 98.85 MB
2. Table of Contents 1.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/1. Endpoint Security Architecture Overview/2. Table of Contents 1.mp4
1. Endpoint Security Architecture 1.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/1. Endpoint Security Architecture Overview/1. Endpoint Security Architecture 1.mp4
6. CIS Controls Critical Security Controls.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/1. Endpoint Security Architecture Overview/6. CIS Controls Critical Security Controls.mp4
5. Endpoint Security Architecture 2.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/1. Endpoint Security Architecture Overview/5. Endpoint Security Architecture 2.mp4
7. First Five CIS Controls.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/1. Endpoint Security Architecture Overview/7. First Five CIS Controls.mp4
4. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/1. Endpoint Security Architecture Overview/4. Course Roadmap.mp4
3. Table of Contents 2.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/1. Endpoint Security Architecture Overview/3. Table of Contents 2.mp4
16. Section 4 Summary
6 files • 94.39 MB
5. SEC511 Workbook AppLocker.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/16. Section 4 Summary/5. SEC511 Workbook AppLocker.mp4
1. Course Roadmap 1.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/16. Section 4 Summary/1. Course Roadmap 1.mp4
4. Course Roadmap 2.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/16. Section 4 Summary/4. Course Roadmap 2.mp4
3. Day 4 TLDR.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/16. Section 4 Summary/3. Day 4 TLDR.mp4
2. Day 4 Punch ListAction Items.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/16. Section 4 Summary/2. Day 4 Punch ListAction Items.mp4
6. SEC511 Daily NetWars.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/16. Section 4 Summary/6. SEC511 Daily NetWars.mp4
3. Patching
7 files • 38.63 MB
3. Patch Timeline Metrics.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/3. Patching/3. Patch Timeline Metrics.mp4
5. To Test or Not to Test.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/3. Patching/5. To Test or Not to Test.mp4
4. Nation States 0days and APT Oh My.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/3. Patching/4. Nation States 0days and APT Oh My.mp4
2. Patching.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/3. Patching/2. Patching.mp4
6. Patch Rinse Repeat.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/3. Patching/6. Patch Rinse Repeat.mp4
7. Modern Patching Challenges.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/3. Patching/7. Modern Patching Challenges.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/3. Patching/1. Course Roadmap.mp4
14. Advanced Authentication Attacks
11 files • 49.55 MB
10. Advanced Authentication Attack Mitigations.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/14. Advanced Authentication Attacks/10. Advanced Authentication Attack Mitigations.mp4
2. PasstheHash.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/14. Advanced Authentication Attacks/2. PasstheHash.mp4
6. The Sed Persistent Threat SPT.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/14. Advanced Authentication Attacks/6. The Sed Persistent Threat SPT.mp4
3. Token Smuggling Pass the Session.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/14. Advanced Authentication Attacks/3. Token Smuggling Pass the Session.mp4
11. MultiFactor Authentication MFA.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/14. Advanced Authentication Attacks/11. MultiFactor Authentication MFA.mp4
4. Pass the Password.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/14. Advanced Authentication Attacks/4. Pass the Password.mp4
9. Announcing Mimiyakz The Sed Persistent Threat SPT Strikes Again.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/14. Advanced Authentication Attacks/9. Announcing Mimiyakz The Sed Persistent Threat SPT Strikes Again.mp4
5. Mandiant MTrends on Mimikatz.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/14. Advanced Authentication Attacks/5. Mandiant MTrends on Mimikatz.mp4
7. This Dog Can Hunt.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/14. Advanced Authentication Attacks/7. This Dog Can Hunt.mp4
8. WhackaMole.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/14. Advanced Authentication Attacks/8. WhackaMole.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/14. Advanced Authentication Attacks/1. Course Roadmap.mp4
15. Endpoint Protection Platforms EPP
16 files • 55.86 MB
2. Endpoint Protection Platforms EPP.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/2. Endpoint Protection Platforms EPP.mp4
15. Endpoint Detection and Response EDR.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/15. Endpoint Detection and Response EDR.mp4
5. Windows Defender Firewall.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/5. Windows Defender Firewall.mp4
13. Detection without Response.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/13. Detection without Response.mp4
10. HostBased IDS.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/10. HostBased IDS.mp4
3. EPP AntivirusAntimalware.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/3. EPP AntivirusAntimalware.mp4
7. Not Windows Defender Firewall.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/7. Not Windows Defender Firewall.mp4
16. Host Detection without HIDSEDR.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/16. Host Detection without HIDSEDR.mp4
14. ASD Mitigation Strategy Endpoint Detection and Response.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/14. ASD Mitigation Strategy Endpoint Detection and Response.mp4
1. Course Roadmap 1.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/1. Course Roadmap 1.mp4
12. Approaches to HIDS.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/12. Approaches to HIDS.mp4
11. Gains from HIDS.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/11. Gains from HIDS.mp4
9. ASD Mitigation Strategy HostBased IDS.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/9. ASD Mitigation Strategy HostBased IDS.mp4
6. Default WDFAS.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/6. Default WDFAS.mp4
4. EPP HostBased Firewall CIS 94.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/4. EPP HostBased Firewall CIS 94.mp4
8. Course Roadmap 2.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/8. Course Roadmap 2.mp4
7. Application Whitelisting
35 files • 97.46 MB
10. Identification of Source.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/10. Identification of Source.mp4
5. The Whitelist.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/5. The Whitelist.mp4
12. Whitelisting Administrative Overhead.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/12. Whitelisting Administrative Overhead.mp4
15. FieldedSystem Executables.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/15. FieldedSystem Executables.mp4
4. Application not file Whitelist.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/4. Application not file Whitelist.mp4
20. Phase 1 Targeted Detection.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/20. Phase 1 Targeted Detection.mp4
24. Blocking Detection.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/24. Blocking Detection.mp4
33. AppLocker Phase 0 Rule Creation.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/33. AppLocker Phase 0 Rule Creation.mp4
26. Previously Trusted Binaries.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/26. Previously Trusted Binaries.mp4
19. Hybrid Approach.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/19. Hybrid Approach.mp4
17. Trusting Signed Binaries by Specific Vendors.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/17. Trusting Signed Binaries by Specific Vendors.mp4
14. NSRL RDS Reference Dataset.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/14. NSRL RDS Reference Dataset.mp4
27. Hash Bypass.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/27. Hash Bypass.mp4
21. TrueFalse Positive.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/21. TrueFalse Positive.mp4
16. PreFielded System Executables.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/16. PreFielded System Executables.mp4
23. Phase 2 Strict Enforcement.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/23. Phase 2 Strict Enforcement.mp4
31. Software Restriction Policies.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/31. Software Restriction Policies.mp4
6. Whitelist Integrity.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/6. Whitelist Integrity.mp4
8. Acquiring Innocuous Binaries.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/8. Acquiring Innocuous Binaries.mp4
28. Arent advanced attackers moving towards code and DLL injection.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/28. Arent advanced attackers moving towards code and DLL injection.mp4
32. AppLocker.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/32. AppLocker.mp4
7. Typical Flow of Executables.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/7. Typical Flow of Executables.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/1. Course Roadmap.mp4
9. Evil Executable Propagation.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/9. Evil Executable Propagation.mp4
11. ZoneIdentifier.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/11. ZoneIdentifier.mp4
22. Phase 1 Duration.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/22. Phase 1 Duration.mp4
18. NIST Special Publication 800167 Guide to Application Whitelisting.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/18. NIST Special Publication 800167 Guide to Application Whitelisting.mp4
30. Linux AppArmor.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/30. Linux AppArmor.mp4
25. Trusted Binaries.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/25. Trusted Binaries.mp4
29. Advanced Application Whitelisting.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/29. Advanced Application Whitelisting.mp4
2. CIS 27 Utilize Application Whitelisting.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/2. CIS 27 Utilize Application Whitelisting.mp4
3. Application Whitelisting.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/3. Application Whitelisting.mp4
13. Phase 0 Whitelist Building.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/13. Phase 0 Whitelist Building.mp4
34. AppLocker Phase 1 Audit Only.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/34. AppLocker Phase 1 Audit Only.mp4
35. Audit Only Mode.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/35. Audit Only Mode.mp4
12. Security Support Provider
9 files • 31.83 MB
7. Microsoft Account Password Lengths and Truncation.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/12. Security Support Provider/7. Microsoft Account Password Lengths and Truncation.mp4
2. Security Support Provider SSP.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/12. Security Support Provider/2. Security Support Provider SSP.mp4
9. LiveSSP FAIL.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/12. Security Support Provider/9. LiveSSP FAIL.mp4
3. SSP Impact of Single SignOn.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/12. Security Support Provider/3. SSP Impact of Single SignOn.mp4
4. SSP WDigest.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/12. Security Support Provider/4. SSP WDigest.mp4
6. Microsoft Live Accounts LiveSSP.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/12. Security Support Provider/6. Microsoft Live Accounts LiveSSP.mp4
5. WDigest FAIL.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/12. Security Support Provider/5. WDigest FAIL.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/12. Security Support Provider/1. Course Roadmap.mp4
8. Lets Try That Again.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/12. Security Support Provider/8. Lets Try That Again.mp4
11. Authentication
11 files • 59.26 MB
8. LMLaMe.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/11. Authentication/8. LMLaMe.mp4
6. Windows A Low Sodium Architecture.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/11. Authentication/6. Windows A Low Sodium Architecture.mp4
7. No Salt Illustrated.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/11. Authentication/7. No Salt Illustrated.mp4
4. Password ReuseSynchronization.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/11. Authentication/4. Password ReuseSynchronization.mp4
11. Password Storage.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/11. Authentication/11. Password Storage.mp4
10. NT.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/11. Authentication/10. NT.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/11. Authentication/1. Course Roadmap.mp4
9. Is LM Finally behind Us.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/11. Authentication/9. Is LM Finally behind Us.mp4
5. Windows Password Hashes.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/11. Authentication/5. Windows Password Hashes.mp4
2. Authentication.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/11. Authentication/2. Authentication.mp4
3. Passwords.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/11. Authentication/3. Passwords.mp4
10. Privilege Reduction
13 files • 48.19 MB
10. Process Monitor.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/10. Process Monitor.mp4
7. Admin Elevated PowerShell.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/7. Admin Elevated PowerShell.mp4
2. Reducing Privileges.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/2. Reducing Privileges.mp4
6. Admin Unelevated PowerShell.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/6. Admin Unelevated PowerShell.mp4
3. UAC Less Privilege Is More Security.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/3. UAC Less Privilege Is More Security.mp4
4. But Im an Admin.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/4. But Im an Admin.mp4
12. Application Compatibility Toolkit ACT.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/12. Application Compatibility Toolkit ACT.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/1. Course Roadmap.mp4
8. Magic Local Admin.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/8. Magic Local Admin.mp4
13. LUA Buglight.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/13. LUA Buglight.mp4
9. No More UAC Bypassing Magic Admin.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/9. No More UAC Bypassing Magic Admin.mp4
5. Loser PowerShell.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/5. Loser PowerShell.mp4
11. Process Monitor Access Denied.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/11. Process Monitor Access Denied.mp4
8. Administrative Accounts
13 files • 62.84 MB
9. Builtin Administrator.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/9. Builtin Administrator.mp4
12. Service Accounts.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/12. Service Accounts.mp4
11. Local Administrator Password Solution LAPS.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/11. Local Administrator Password Solution LAPS.mp4
7. What Does Admin Mean.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/7. What Does Admin Mean.mp4
6. How Many Administrative Accounts.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/6. How Many Administrative Accounts.mp4
13. LSA Secrets.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/13. LSA Secrets.mp4
10. Builtin Administrator Passwords.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/10. Builtin Administrator Passwords.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/1. Course Roadmap.mp4
2. Inevitable Exploitation.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/2. Inevitable Exploitation.mp4
8. RightsPermissions.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/8. RightsPermissions.mp4
3. Adversary Privilege.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/3. Adversary Privilege.mp4
5. Administrative Accounts.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/5. Administrative Accounts.mp4
4. Privileged Accounts.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/4. Privileged Accounts.mp4
5. EMET and Windows Defender Exploit Guard
9 files • 40.12 MB
8. Windows Defender Technologies in a Table Part 1 from Minerva Labs 1.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/5. EMET and Windows Defender Exploit Guard/8. Windows Defender Technologies in a Table Part 1 from Minerva Labs 1.mp4
3. EMET.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/5. EMET and Windows Defender Exploit Guard/3. EMET.mp4
4. RIP EMET.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/5. EMET and Windows Defender Exploit Guard/4. RIP EMET.mp4
6. EMET Configuration GUI.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/5. EMET and Windows Defender Exploit Guard/6. EMET Configuration GUI.mp4
5. EMET Features.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/5. EMET and Windows Defender Exploit Guard/5. EMET Features.mp4
9. Windows Defender Technologies in a Table Part 2 from Minerva Labs 1.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/5. EMET and Windows Defender Exploit Guard/9. Windows Defender Technologies in a Table Part 2 from Minerva Labs 1.mp4
7. Windows Defender Exploit Guard WDEG.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/5. EMET and Windows Defender Exploit Guard/7. Windows Defender Exploit Guard WDEG.mp4
2. CIS 83 EnableDeploy AntiExploitation Technologies.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/5. EMET and Windows Defender Exploit Guard/2. CIS 83 EnableDeploy AntiExploitation Technologies.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/5. EMET and Windows Defender Exploit Guard/1. Course Roadmap.mp4
4. Secure Baseline Configuration
14 files • 46.97 MB
14. Baseline Monitoring.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/14. Baseline Monitoring.mp4
3. Foreverday 0day.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/3. Foreverday 0day.mp4
5. CIS 51 Secure Baseline Configuration.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/5. CIS 51 Secure Baseline Configuration.mp4
4. SMBv1 and the West Coast Hippy Lifestyle.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/4. SMBv1 and the West Coast Hippy Lifestyle.mp4
7. How NOT to Build a Config.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/7. How NOT to Build a Config.mp4
8. Center for Internet Security.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/8. Center for Internet Security.mp4
13. Configuration Change Monitoring.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/13. Configuration Change Monitoring.mp4
2. Shadow Brokers Patching Hardening.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/2. Shadow Brokers Patching Hardening.mp4
11. Microsoft Security Compliance Toolkit SCT.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/11. Microsoft Security Compliance Toolkit SCT.mp4
9. CIS Benchmarks.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/9. CIS Benchmarks.mp4
6. Building a Baseline Config.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/6. Building a Baseline Config.mp4
12. Beyond Vendors and CIS.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/12. Beyond Vendors and CIS.mp4
10. Vendor Guides.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/10. Vendor Guides.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/1. Course Roadmap.mp4
2. Windows Endpoints
5 files • 16.95 MB
4. Endpoints More Than Desktops.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/2. Windows Endpoints/4. Endpoints More Than Desktops.mp4
3. Endpoints More Than Windows.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/2. Windows Endpoints/3. Endpoints More Than Windows.mp4
5. Endpoints Beyond DesktopsServers.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/2. Windows Endpoints/5. Endpoints Beyond DesktopsServers.mp4
2. What We Cover.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/2. Windows Endpoints/2. What We Cover.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/2. Windows Endpoints/1. Course Roadmap.mp4
13. PostAuthentication
7 files • 17.71 MB
7. Delegate Tokens.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/13. PostAuthentication/7. Delegate Tokens.mp4
4. Access Tokens.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/13. PostAuthentication/4. Access Tokens.mp4
3. Logon Types.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/13. PostAuthentication/3. Logon Types.mp4
2. PostAuthentication.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/13. PostAuthentication/2. PostAuthentication.mp4
5. Token Impersonation Levels.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/13. PostAuthentication/5. Token Impersonation Levels.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/13. PostAuthentication/1. Course Roadmap.mp4
6. Impersonate Tokens.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/4. Endpoint Security Architecture/13. PostAuthentication/6. Impersonate Tokens.mp4
2. Network Security Architecture
186 files • 1.11 GB
16. Section Two Summary
6 files • 211.45 MB
5. SEC511 Workbook Honeytokens for Leak Detection.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/16. Section Two Summary/5. SEC511 Workbook Honeytokens for Leak Detection.mp4
2. Day 2 Punch ListAction Items.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/16. Section Two Summary/2. Day 2 Punch ListAction Items.mp4
3. Day 2 TLDR.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/16. Section Two Summary/3. Day 2 TLDR.mp4
1. Course Roadmap 1.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/16. Section Two Summary/1. Course Roadmap 1.mp4
4. Course Roadmap 2.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/16. Section Two Summary/4. Course Roadmap 2.mp4
6. SEC511 Daily NetWars.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/16. Section Two Summary/6. SEC511 Daily NetWars.mp4
4. Web Application Firewalls
11 files • 93.47 MB
11. SEC511 Workbook ModSecurity.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/4. Web Application Firewalls/11. SEC511 Workbook ModSecurity.mp4
6. WAF Deployments.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/4. Web Application Firewalls/6. WAF Deployments.mp4
5. WAF PreventionDetection.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/4. Web Application Firewalls/5. WAF PreventionDetection.mp4
4. WAF Capabilities.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/4. Web Application Firewalls/4. WAF Capabilities.mp4
3. Web Application Firewalls.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/4. Web Application Firewalls/3. Web Application Firewalls.mp4
2. CIS 1810 Deploy Web Application Firewalls.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/4. Web Application Firewalls/2. CIS 1810 Deploy Web Application Firewalls.mp4
8. WAF vs Scenario 1 Web App Detection.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/4. Web Application Firewalls/8. WAF vs Scenario 1 Web App Detection.mp4
7. WAF vs Scenario 1 Web App Prevention.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/4. Web Application Firewalls/7. WAF vs Scenario 1 Web App Prevention.mp4
1. Course Roadmap 1.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/4. Web Application Firewalls/1. Course Roadmap 1.mp4
9. WAF vs Scenario 2 Client PreventionDetection.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/4. Web Application Firewalls/9. WAF vs Scenario 2 Client PreventionDetection.mp4
10. Course Roadmap 2.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/4. Web Application Firewalls/10. Course Roadmap 2.mp4
9. NextGeneration Firewalls
13 files • 92.16 MB
13. SEC511 Workbook Application Detection and Control with Snort OpenAppId.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/13. SEC511 Workbook Application Detection and Control with Snort OpenAppId.mp4
5. Application IdentificationInspection.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/5. Application IdentificationInspection.mp4
7. Another SI vs NGFW Scenario.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/7. Another SI vs NGFW Scenario.mp4
6. OpenAppId.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/6. OpenAppId.mp4
4. SI vs NGFW Example.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/4. SI vs NGFW Example.mp4
3. Layer 7 Firewalling.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/3. Layer 7 Firewalling.mp4
10. NGFW vs Scenario 2 Client Prevention.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/10. NGFW vs Scenario 2 Client Prevention.mp4
8. User Visibility and Reputation.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/8. User Visibility and Reputation.mp4
11. NGFW vs Scenario 2 Client Detection.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/11. NGFW vs Scenario 2 Client Detection.mp4
2. NextGeneration Firewalls NGFW.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/2. NextGeneration Firewalls NGFW.mp4
9. NGFW vs Scenario 1 Web App.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/9. NGFW vs Scenario 1 Web App.mp4
12. Course Roadmap 2.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/12. Course Roadmap 2.mp4
1. Course Roadmap 1.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/1. Course Roadmap 1.mp4
1. Network Security Architecture
31 files • 157.13 MB
2. Table of Contents 1.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/1. Network Security Architecture/2. Table of Contents 1.mp4
3. Table of Contents 2.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/1. Network Security Architecture/3. Table of Contents 2.mp4
1. Network Security Architecture.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/1. Network Security Architecture/1. Network Security Architecture.mp4
8. BeyondCorp Googles Approach to Zero Trust.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/1. Network Security Architecture/8. BeyondCorp Googles Approach to Zero Trust.mp4
7. Zero Trust Architecture ZTA.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/1. Network Security Architecture/7. Zero Trust Architecture ZTA.mp4
9. ZTA and Modern Architectures.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/1. Network Security Architecture/9. ZTA and Modern Architectures.mp4
6. What About that Soft Chewy Center.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/1. Network Security Architecture/6. What About that Soft Chewy Center.mp4
5. Traditional Perimeter Defense and the Crunchy Shell.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/1. Network Security Architecture/5. Traditional Perimeter Defense and the Crunchy Shell.mp4
11. Cyber Defense Illustrated.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/1. Network Security Architecture/11. Cyber Defense Illustrated.mp4
19. PostExploitation Data Exfiltration.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/1. Network Security Architecture/19. PostExploitation Data Exfiltration.mp4
24. Recon Watering Hole ID.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/1. Network Security Architecture/24. Recon Watering Hole ID.mp4
10. Key Infrastructure Devices.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/1. Network Security Architecture/10. Key Infrastructure Devices.mp4
31. Illustrations Applied.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/1. Network Security Architecture/31. Illustrations Applied.mp4
25. Weaponization Watering Hole Established.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/1. Network Security Architecture/25. Weaponization Watering Hole Established.mp4
28. Pivot Target Acquired.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/1. Network Security Architecture/28. Pivot Target Acquired.mp4
29. Goal Achieved Data Exfiltration.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/1. Network Security Architecture/29. Goal Achieved Data Exfiltration.mp4
27. PostExploitation C2 Establishment.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/1. Network Security Architecture/27. PostExploitation C2 Establishment.mp4
15. Scenario 1 Web Application Attack.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/1. Network Security Architecture/15. Scenario 1 Web Application Attack.mp4
12. Caprica 6 vs the Colonies.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/1. Network Security Architecture/12. Caprica 6 vs the Colonies.mp4
20. Scenario 1 Web Application Attack Key Points.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/1. Network Security Architecture/20. Scenario 1 Web Application Attack Key Points.mp4
18. Exploitation SQL Injection in Web Application.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/1. Network Security Architecture/18. Exploitation SQL Injection in Web Application.mp4
17. Mapping Web Server Located via Targeted DNS.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/1. Network Security Architecture/17. Mapping Web Server Located via Targeted DNS.mp4
23. Scenario 2 Watering Hole ClientSide Pivot 3.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/1. Network Security Architecture/23. Scenario 2 Watering Hole ClientSide Pivot 3.mp4
16. Recon Build a Targeted Wordlist.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/1. Network Security Architecture/16. Recon Build a Targeted Wordlist.mp4
21. Scenario 2 Watering Hole ClientSide Pivot 1.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/1. Network Security Architecture/21. Scenario 2 Watering Hole ClientSide Pivot 1.mp4
4. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/1. Network Security Architecture/4. Course Roadmap.mp4
13. The BSG Threat Hunting Team.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/1. Network Security Architecture/13. The BSG Threat Hunting Team.mp4
26. Exploitation ClientSide Exploitation.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/1. Network Security Architecture/26. Exploitation ClientSide Exploitation.mp4
14. Scenario 1 The Ambitious Lt Gaeta.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/1. Network Security Architecture/14. Scenario 1 The Ambitious Lt Gaeta.mp4
22. Scenario 2 Watering Hole ClientSide Pivot 2.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/1. Network Security Architecture/22. Scenario 2 Watering Hole ClientSide Pivot 2.mp4
30. Scenario 2 ClientSide Pivot Key Points.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/1. Network Security Architecture/30. Scenario 2 ClientSide Pivot Key Points.mp4
2. Routers
15 files • 75.28 MB
9. Unexpected Destinations.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/2. Routers/9. Unexpected Destinations.mp4
5. Profile Outbound Flows.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/2. Routers/5. Profile Outbound Flows.mp4
3. RouterBased Detection IPFIXNetFlow.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/2. Routers/3. RouterBased Detection IPFIXNetFlow.mp4
8. HighVolume Outbound Connections.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/2. Routers/8. HighVolume Outbound Connections.mp4
10. Outbound Visualization.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/2. Routers/10. Outbound Visualization.mp4
7. Persistent Outbound Connections.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/2. Routers/7. Persistent Outbound Connections.mp4
4. IPFIXNetFlow Data.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/2. Routers/4. IPFIXNetFlow Data.mp4
14. Routers vs Scenario 2 Client Prevention.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/2. Routers/14. Routers vs Scenario 2 Client Prevention.mp4
2. Routers.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/2. Routers/2. Routers.mp4
11. Routers Action Items.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/2. Routers/11. Routers Action Items.mp4
6. Abnormal Outbound Connections.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/2. Routers/6. Abnormal Outbound Connections.mp4
13. Routers vs Scenario 1 Web App Detection.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/2. Routers/13. Routers vs Scenario 1 Web App Detection.mp4
12. Routers vs Scenario 1 Web App Prevention.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/2. Routers/12. Routers vs Scenario 1 Web App Prevention.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/2. Routers/1. Course Roadmap.mp4
15. Routers vs Scenario 2 Client Detection.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/2. Routers/15. Routers vs Scenario 2 Client Detection.mp4
3. Perimeter SI Firewalls
12 files • 69.43 MB
8. Layer 4 Outbound Filtering.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/8. Layer 4 Outbound Filtering.mp4
5. Additional Layer 3 Inbound Filtering.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/5. Additional Layer 3 Inbound Filtering.mp4
4. Default Deny Inbound.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/4. Default Deny Inbound.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/1. Course Roadmap.mp4
11. SI Firewall vs Scenario 2 Client Prevention.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/11. SI Firewall vs Scenario 2 Client Prevention.mp4
3. Understanding Stateful.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/3. Understanding Stateful.mp4
12. SI Firewall vs Scenario 2 Client Detection.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/12. SI Firewall vs Scenario 2 Client Detection.mp4
9. SI Firewall vs Scenario 1 Web App Prevention.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/9. SI Firewall vs Scenario 1 Web App Prevention.mp4
6. Default Deny Outbound.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/6. Default Deny Outbound.mp4
7. Layer 3 Outbound Filtering.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/7. Layer 3 Outbound Filtering.mp4
2. Perimeter SI Firewalls.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/2. Perimeter SI Firewalls.mp4
10. SI Firewall vs Scenario 1 Web App Detection.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/10. SI Firewall vs Scenario 1 Web App Detection.mp4
11. Entropy and freqpy
13 files • 76.78 MB
10. freqing Awesome.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/10. freqing Awesome.mp4
7. Bring Out the Baggett.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/7. Bring Out the Baggett.mp4
5. ent Classic Entropy Analysis.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/5. ent Classic Entropy Analysis.mp4
13. freqserverpy For freqing at Scale.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/13. freqserverpy For freqing at Scale.mp4
6. Assessing ent.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/6. Assessing ent.mp4
11. Domain Generation Algorithms DGAs.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/11. Domain Generation Algorithms DGAs.mp4
3. High Entropy Examples.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/3. High Entropy Examples.mp4
2. A Word on Entropy.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/2. A Word on Entropy.mp4
8. Get Your freqpy On.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/8. Get Your freqpy On.mp4
12. DGA Beyond Domain Generation Algorithms.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/12. DGA Beyond Domain Generation Algorithms.mp4
4. Programmatic Entropy Analysis.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/4. Programmatic Entropy Analysis.mp4
9. freqteststring.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/9. freqteststring.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/1. Course Roadmap.mp4
5. Forward Proxies
13 files • 66.34 MB
8. MIMEContentType BlockingAlerting.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/5. Forward Proxies/8. MIMEContentType BlockingAlerting.mp4
7. Blacklisting Billions.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/5. Forward Proxies/7. Blacklisting Billions.mp4
11. Splash Proxy.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/5. Forward Proxies/11. Splash Proxy.mp4
4. Proxy Configuration of Clients.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/5. Forward Proxies/4. Proxy Configuration of Clients.mp4
3. Proxy or Bust.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/5. Forward Proxies/3. Proxy or Bust.mp4
6. Web Content Filters.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/5. Forward Proxies/6. Web Content Filters.mp4
2. Forward Proxies.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/5. Forward Proxies/2. Forward Proxies.mp4
12. Forward Proxy vs Scenario 2 Client Prevention.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/5. Forward Proxies/12. Forward Proxy vs Scenario 2 Client Prevention.mp4
5. WPAD.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/5. Forward Proxies/5. WPAD.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/5. Forward Proxies/1. Course Roadmap.mp4
9. MIMEContentType Illustrated.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/5. Forward Proxies/9. MIMEContentType Illustrated.mp4
10. Beyond Website Categorization.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/5. Forward Proxies/10. Beyond Website Categorization.mp4
13. Forward Proxy vs Scenario 2 Client Detection.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/5. Forward Proxies/13. Forward Proxy vs Scenario 2 Client Detection.mp4
6. Encryption and TLS Inspection
10 files • 64.01 MB
10. DoH DNS Request.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/6. Encryption and TLS Inspection/10. DoH DNS Request.mp4
8. DNS over TLS DoT.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/6. Encryption and TLS Inspection/8. DNS over TLS DoT.mp4
3. Enterprise Responses to Outbound HTTPS Encryption.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/6. Encryption and TLS Inspection/3. Enterprise Responses to Outbound HTTPS Encryption.mp4
9. DNS Over HTTPS DoH .mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/6. Encryption and TLS Inspection/9. DNS Over HTTPS DoH .mp4
7. Encryption Beyond HTTPS.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/6. Encryption and TLS Inspection/7. Encryption Beyond HTTPS.mp4
5. Decrypting HTTPS with InterceptionInspection.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/6. Encryption and TLS Inspection/5. Decrypting HTTPS with InterceptionInspection.mp4
6. Never Decrypt All The Things.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/6. Encryption and TLS Inspection/6. Never Decrypt All The Things.mp4
4. CIS 1210 Decrypt Network Traffic at Proxy.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/6. Encryption and TLS Inspection/4. CIS 1210 Decrypt Network Traffic at Proxy.mp4
2. Encrypt All the Things.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/6. Encryption and TLS Inspection/2. Encrypt All the Things.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/6. Encryption and TLS Inspection/1. Course Roadmap.mp4
10. Malware Detonation Devices
6 files • 40.54 MB
2. Malware Detonation Devices.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/10. Malware Detonation Devices/2. Malware Detonation Devices.mp4
6. Malware Detonation vs Scenario 2 Client PreventionDetection.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/10. Malware Detonation Devices/6. Malware Detonation vs Scenario 2 Client PreventionDetection.mp4
3. MDD Capabilities.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/10. Malware Detonation Devices/3. MDD Capabilities.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/10. Malware Detonation Devices/1. Course Roadmap.mp4
4. Cuckoo Sandbox.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/10. Malware Detonation Devices/4. Cuckoo Sandbox.mp4
5. Malwr.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/10. Malware Detonation Devices/5. Malwr.mp4
12. Security Information and Event Management SIEM
9 files • 35.41 MB
6. Dual Stack SIEM Compliance Tactical.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/12. Security Information and Event Management SIEM/6. Dual Stack SIEM Compliance Tactical.mp4
2. Security Information and Event Management SIEM.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/12. Security Information and Event Management SIEM/2. Security Information and Event Management SIEM.mp4
7. SIEMs Killer App Log Enrichment.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/12. Security Information and Event Management SIEM/7. SIEMs Killer App Log Enrichment.mp4
3. Data Overload.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/12. Security Information and Event Management SIEM/3. Data Overload.mp4
5. DefineSIEM.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/12. Security Information and Event Management SIEM/5. DefineSIEM.mp4
9. SIEM and Detection.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/12. Security Information and Event Management SIEM/9. SIEM and Detection.mp4
4. SIEM Centralized Log Collection.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/12. Security Information and Event Management SIEM/4. SIEM Centralized Log Collection.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/12. Security Information and Event Management SIEM/1. Course Roadmap.mp4
8. SIEM and Prevention.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/12. Security Information and Event Management SIEM/8. SIEM and Prevention.mp4
7. Network Intrusion Detection Systems
12 files • 48.73 MB
5. NIDS Configuration.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/5. NIDS Configuration.mp4
4. Other NIDS Placement.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/4. Other NIDS Placement.mp4
12. NIDS Scenario 2 Detection FTW.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/12. NIDS Scenario 2 Detection FTW.mp4
10. NIDS vs Scenario 2 Client Detection 1.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/10. NIDS vs Scenario 2 Client Detection 1.mp4
7. IDS Trust Relationships Visualized.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/7. IDS Trust Relationships Visualized.mp4
3. Perimeter NIDS Placement.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/3. Perimeter NIDS Placement.mp4
9. NIDS vs Scenario 1 Web Detection.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/9. NIDS vs Scenario 1 Web Detection.mp4
11. NIDS vs Scenario 2 Client Detection 2.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/11. NIDS vs Scenario 2 Client Detection 2.mp4
2. Network Intrusion Detection Systems NIDS.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/2. Network Intrusion Detection Systems NIDS.mp4
6. Invisibility Analysis IDS and Trust.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/6. Invisibility Analysis IDS and Trust.mp4
8. NIDS and Prevention.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/8. NIDS and Prevention.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/1. Course Roadmap.mp4
15. Threat Intelligence
13 files • 35.21 MB
6. DetectRespond Lifecycle.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/15. Threat Intelligence/6. DetectRespond Lifecycle.mp4
2. Threat Intelligence.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/15. Threat Intelligence/2. Threat Intelligence.mp4
5. Indicator Identification.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/15. Threat Intelligence/5. Indicator Identification.mp4
13. Other FileURL Analysis.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/15. Threat Intelligence/13. Other FileURL Analysis.mp4
4. Kill Chain Revisited.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/15. Threat Intelligence/4. Kill Chain Revisited.mp4
3. TTPs.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/15. Threat Intelligence/3. TTPs.mp4
9. File and URL Analysis.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/15. Threat Intelligence/9. File and URL Analysis.mp4
8. IOCs.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/15. Threat Intelligence/8. IOCs.mp4
10. VirusTotal.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/15. Threat Intelligence/10. VirusTotal.mp4
7. Dirty Word List DWL.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/15. Threat Intelligence/7. Dirty Word List DWL.mp4
12. URL Analysis.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/15. Threat Intelligence/12. URL Analysis.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/15. Threat Intelligence/1. Course Roadmap.mp4
11. Evading AV or AllClear.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/15. Threat Intelligence/11. Evading AV or AllClear.mp4
8. Network Intrusion Prevention Systems
6 files • 15.68 MB
3. NIPS NGFW.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/8. Network Intrusion Prevention Systems/3. NIPS NGFW.mp4
2. Network Intrusion Prevention Systems NIPS.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/8. Network Intrusion Prevention Systems/2. Network Intrusion Prevention Systems NIPS.mp4
4. NIPS and Detection vs Scenario 12.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/8. Network Intrusion Prevention Systems/4. NIPS and Detection vs Scenario 12.mp4
5. NIPS vs Scenario 1 Web App Prevention.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/8. Network Intrusion Prevention Systems/5. NIPS vs Scenario 1 Web App Prevention.mp4
6. NIPS vs Scenario 2 Client Prevention.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/8. Network Intrusion Prevention Systems/6. NIPS vs Scenario 2 Client Prevention.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/8. Network Intrusion Prevention Systems/1. Course Roadmap.mp4
13. Adversary Deception Devices
7 files • 26.44 MB
5. Internal Listening Honeypots.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/13. Adversary Deception Devices/5. Internal Listening Honeypots.mp4
7. Tactical Honeypots.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/13. Adversary Deception Devices/7. Tactical Honeypots.mp4
4. Traditional Honeypots.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/13. Adversary Deception Devices/4. Traditional Honeypots.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/13. Adversary Deception Devices/1. Course Roadmap.mp4
6. HighValue Deception.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/13. Adversary Deception Devices/6. HighValue Deception.mp4
2. Adversary Deception Devices.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/13. Adversary Deception Devices/2. Adversary Deception Devices.mp4
3. HoneypotsHoneynets.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/13. Adversary Deception Devices/3. HoneypotsHoneynets.mp4
14. SwitchesPVLAN Security
9 files • 25.39 MB
4. VLAN ACLs VACLs.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/14. SwitchesPVLAN Security/4. VLAN ACLs VACLs.mp4
2. Switches.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/14. SwitchesPVLAN Security/2. Switches.mp4
9. SwitchInternal SI Firewall and Pivoting.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/14. SwitchesPVLAN Security/9. SwitchInternal SI Firewall and Pivoting.mp4
7. Potential Issues with Private VLANs.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/14. SwitchesPVLAN Security/7. Potential Issues with Private VLANs.mp4
6. Private VLANs PVLANs.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/14. SwitchesPVLAN Security/6. Private VLANs PVLANs.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/14. SwitchesPVLAN Security/1. Course Roadmap.mp4
5. CIS 143 Disable WorkstationtoWorkstation Communication.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/14. SwitchesPVLAN Security/5. CIS 143 Disable WorkstationtoWorkstation Communication.mp4
8. Internal SI Firewalls.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/14. SwitchesPVLAN Security/8. Internal SI Firewalls.mp4
3. IPFIXNetFlow.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/2. Network Security Architecture/14. SwitchesPVLAN Security/3. IPFIXNetFlow.mp4
5. Automation and Continuous Security Monitoring
197 files • 904.61 MB
15. Section 5 Summary
5 files • 103.52 MB
3. SEC511 Workbook Persistence and Pivoting.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/15. Section 5 Summary/3. SEC511 Workbook Persistence and Pivoting.mp4
2. Day 5 Punch ListAction Items.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/15. Section 5 Summary/2. Day 5 Punch ListAction Items.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/15. Section 5 Summary/1. Course Roadmap.mp4
5. Thank You.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/15. Section 5 Summary/5. Thank You.mp4
4. SEC511 Daily NetWars.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/15. Section 5 Summary/4. SEC511 Daily NetWars.mp4
1. Continuous Security Monitoring Overview
18 files • 132.79 MB
2. Table of Contents 1.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/2. Table of Contents 1.mp4
14. NIST SP 800137 Automation Domains.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/14. NIST SP 800137 Automation Domains.mp4
1. Automation and Continuous Security Monitoring.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/1. Automation and Continuous Security Monitoring.mp4
10. Department of Homeland Securitys CDM.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/10. Department of Homeland Securitys CDM.mp4
8. DoD Risk Management Framework.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/8. DoD Risk Management Framework.mp4
9. Bejtlich on RMF.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/9. Bejtlich on RMF.mp4
16. Spotting the Adversary with Windows Event Log Monitoring Version 2.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/16. Spotting the Adversary with Windows Event Log Monitoring Version 2.mp4
5. What Is Continuous Security Monitoring.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/5. What Is Continuous Security Monitoring.mp4
6. Acronym Soup.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/6. Acronym Soup.mp4
17. The US Governments Take on CSM Lessons Learned.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/17. The US Governments Take on CSM Lessons Learned.mp4
18. Our Approach to CSM.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/18. Our Approach to CSM.mp4
13. NIST Special Publication 800137.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/13. NIST Special Publication 800137.mp4
7. The US Government and Continuous Monitoring.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/7. The US Government and Continuous Monitoring.mp4
12. NIST SP 800137.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/12. NIST SP 800137.mp4
11. Bejtlich on CDM.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/11. Bejtlich on CDM.mp4
15. NIST SP 800137 What to Do Not How to Do It.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/15. NIST SP 800137 What to Do Not How to Do It.mp4
4. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/4. Course Roadmap.mp4
3. Table of Contents 2.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/3. Table of Contents 2.mp4
3. Winning CSM Techniques
17 files • 126.45 MB
16. Lets Try Long Tail Analysis on Windows Security Logs.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/16. Lets Try Long Tail Analysis on Windows Security Logs.mp4
15. The Long Tail 1.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/15. The Long Tail 1.mp4
3. Monitoring a NonDefensible Network.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/3. Monitoring a NonDefensible Network.mp4
9. Windows Data Classification Tools.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/9. Windows Data Classification Tools.mp4
4. Focus on Critical Systems and Data.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/4. Focus on Critical Systems and Data.mp4
12. The Broken Windows Theory.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/12. The Broken Windows Theory.mp4
7. High Data in All the Wrong Places.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/7. High Data in All the Wrong Places.mp4
11. Solve Problems as They Are Discovered.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/11. Solve Problems as They Are Discovered.mp4
6. Data Classification HowTo.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/6. Data Classification HowTo.mp4
14. Key CSM Technique Long Tail Analysis.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/14. Key CSM Technique Long Tail Analysis.mp4
13. Broken Windows Theory of Defensible Networks.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/13. Broken Windows Theory of Defensible Networks.mp4
8. Protect High Data.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/8. Protect High Data.mp4
5. FIPS 199 on SBU Classification.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/5. FIPS 199 on SBU Classification.mp4
10. Detecting Change.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/10. Detecting Change.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/1. Course Roadmap.mp4
2. Winning CSM Techniques.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/2. Winning CSM Techniques.mp4
17. The Long Tail 2.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/17. The Long Tail 2.mp4
12. Monitoring Critical Windows Events
43 files • 172.86 MB
43. SEC511 Workbook Windows Event Logs.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/43. SEC511 Workbook Windows Event Logs.mp4
10. Local View Meterpreter Payload.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/10. Local View Meterpreter Payload.mp4
31. Critical Event 9 Detecting Lateral Movement.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/31. Critical Event 9 Detecting Lateral Movement.mp4
35. Attacker View Metasploit PsExec PasstheHash 1.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/35. Attacker View Metasploit PsExec PasstheHash 1.mp4
37. Didnt Microsoft Fix This.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/37. Didnt Microsoft Fix This.mp4
33. Track the Use of Local Credentials via the Network.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/33. Track the Use of Local Credentials via the Network.mp4
13. Attacker Uses Metasploit PsExec Exploit.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/13. Attacker Uses Metasploit PsExec Exploit.mp4
2. Monitoring Critical Windows Events.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/2. Monitoring Critical Windows Events.mp4
3. Windows Event Log Locations.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/3. Windows Event Log Locations.mp4
7. Critical Windows Event to Monitor.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/7. Critical Windows Event to Monitor.mp4
23. Critical Event 5 Clearing Event Logs.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/23. Critical Event 5 Clearing Event Logs.mp4
15. System Event ID 7045 Sysinternals versus Metasploit PsExec.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/15. System Event ID 7045 Sysinternals versus Metasploit PsExec.mp4
9. Critical Event 1 CommandLine Auditing.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/9. Critical Event 1 CommandLine Auditing.mp4
4. Damaged Windows Event Logs.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/4. Damaged Windows Event Logs.mp4
26. Critical Event 7 External Media Detection.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/26. Critical Event 7 External Media Detection.mp4
32. Use of Local versus Domain Credentials.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/32. Use of Local versus Domain Credentials.mp4
18. Critical Event 3 User Creation.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/18. Critical Event 3 User Creation.mp4
25. Event Viewer System Log View.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/25. Event Viewer System Log View.mp4
28. Critical Event 8 Disabling the Firewall.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/28. Critical Event 8 Disabling the Firewall.mp4
27. Event Viewer System Log View New USB Drive.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/27. Event Viewer System Log View New USB Drive.mp4
20. Critical Event 4 Adding Users to Privileged Groups.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/20. Critical Event 4 Adding Users to Privileged Groups.mp4
30. Adding Specific Firewall Rules.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/30. Adding Specific Firewall Rules.mp4
24. Critical Event 6 Terminal Services Certificate Creation.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/24. Critical Event 6 Terminal Services Certificate Creation.mp4
19. Event Viewer Security Log View net user sec511 sekrit add.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/19. Event Viewer Security Log View net user sec511 sekrit add.mp4
12. Event IDs 7045 and 4697 normal Service Creation.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/12. Event IDs 7045 and 4697 normal Service Creation.mp4
29. Event Viewer View Disabling the Firewall.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/29. Event Viewer View Disabling the Firewall.mp4
38. PasstheHash and Lateral Movement Mitigation.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/38. PasstheHash and Lateral Movement Mitigation.mp4
41. Summary Critical Windows Events to Monitor.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/41. Summary Critical Windows Events to Monitor.mp4
16. System Event ID 7030 Track Errors.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/16. System Event ID 7030 Track Errors.mp4
34. PasstheHash Detection.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/34. PasstheHash Detection.mp4
5. Viewing Windows Security Event Logs.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/5. Viewing Windows Security Event Logs.mp4
11. Critical Event 2 Service Creation.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/11. Critical Event 2 Service Creation.mp4
39. Critical Event 10 AppLocker Alerts.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/39. Critical Event 10 AppLocker Alerts.mp4
17. A Word on Scripting and Automation.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/17. A Word on Scripting and Automation.mp4
6. Exporting Event Logs.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/6. Exporting Event Logs.mp4
14. How Does This Differ from Normal PsExec.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/14. How Does This Differ from Normal PsExec.mp4
40. Critical Event 11 EMET Alerts.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/40. Critical Event 11 EMET Alerts.mp4
8. Detecting Malice via Windows Events.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/8. Detecting Malice via Windows Events.mp4
42. Course Roadmap 2.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/42. Course Roadmap 2.mp4
22. Tracking Changes to Domain Groups.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/22. Tracking Changes to Domain Groups.mp4
21. Event Viewer Security Log View net localgroup administrators sec511 add.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/21. Event Viewer Security Log View net localgroup administrators sec511 add.mp4
36. Attacker View Metasploit PsExec PasstheHash 2.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/36. Attacker View Metasploit PsExec PasstheHash 2.mp4
1. Course Roadmap 1.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/1. Course Roadmap 1.mp4
6. Passive OS Detection
10 files • 66.1 MB
10. SEC511 Workbook p0f v3.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/6. Passive OS Detection/10. SEC511 Workbook p0f v3.mp4
2. Passive Host Discovery.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/6. Passive OS Detection/2. Passive Host Discovery.mp4
4. p0f version 3.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/6. Passive OS Detection/4. p0f version 3.mp4
1. Course Roadmap 1.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/6. Passive OS Detection/1. Course Roadmap 1.mp4
3. Passive Scanning.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/6. Passive OS Detection/3. Passive Scanning.mp4
5. PRADS.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/6. Passive OS Detection/5. PRADS.mp4
8. CleanedUp Output.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/6. Passive OS Detection/8. CleanedUp Output.mp4
6. Raw PRADS Log View in Gnumeric Spreadsheet.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/6. Passive OS Detection/6. Raw PRADS Log View in Gnumeric Spreadsheet.mp4
7. Lets Clean That Up a Bit.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/6. Passive OS Detection/7. Lets Clean That Up a Bit.mp4
9. Course Roadmap 2.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/6. Passive OS Detection/9. Course Roadmap 2.mp4
5. Host and Service Discovery
13 files • 53.56 MB
13. SEC511 Workbook Inventory.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/13. SEC511 Workbook Inventory.mp4
9. Always Test.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/9. Always Test.mp4
11. Ndiff.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/11. Ndiff.mp4
5. Inventories.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/5. Inventories.mp4
3. Cant Secure What You Dont Have or Dont Know You Have.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/3. Cant Secure What You Dont Have or Dont Know You Have.mp4
7. Host Port and Service Discovery.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/7. Host Port and Service Discovery.mp4
6. Asset Inventory.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/6. Asset Inventory.mp4
2. Know Thy Software.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/2. Know Thy Software.mp4
10. Nmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/10. Nmap.mp4
1. Course Roadmap 1.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/1. Course Roadmap 1.mp4
8. Active Scanning.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/8. Active Scanning.mp4
4. Inventory and Control of Hardware Assets.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/4. Inventory and Control of Hardware Assets.mp4
12. Course Roadmap 2.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/12. Course Roadmap 2.mp4
2. Industry Best Practices
10 files • 48.4 MB
10. ASD Mitigation Strategies to Detect and Respond.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/2. Industry Best Practices/10. ASD Mitigation Strategies to Detect and Respond.mp4
5. Top 4 Mitigation Strategies.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/2. Industry Best Practices/5. Top 4 Mitigation Strategies.mp4
6. ASD Essential Eight Prevent Malware Delivery and Execution.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/2. Industry Best Practices/6. ASD Essential Eight Prevent Malware Delivery and Execution.mp4
2. Industry Best Practices.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/2. Industry Best Practices/2. Industry Best Practices.mp4
3. CIS Controls.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/2. Industry Best Practices/3. CIS Controls.mp4
8. ASD Essential Eight Recover Data and System Availability.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/2. Industry Best Practices/8. ASD Essential Eight Recover Data and System Availability.mp4
9. The ASD Top 4 Focus on Prevention.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/2. Industry Best Practices/9. The ASD Top 4 Focus on Prevention.mp4
4. ASD Strategies to Mitigate Cyber Security Incidents.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/2. Industry Best Practices/4. ASD Strategies to Mitigate Cyber Security Incidents.mp4
7. ASD Essential Eight Limit Extent of Incidents.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/2. Industry Best Practices/7. ASD Essential Eight Limit Extent of Incidents.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/2. Industry Best Practices/1. Course Roadmap.mp4
11. Leveraging Proxy and Firewall Data
12 files • 33.38 MB
11. Bots Love Spam.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/11. Bots Love Spam.mp4
6. Behavioral Proxy Checks.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/6. Behavioral Proxy Checks.mp4
5. Proxies Rule.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/5. Proxies Rule.mp4
12. Which Outbound Ports to BlockLogAlert.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/12. Which Outbound Ports to BlockLogAlert.mp4
7. Case Study Naked Downloads.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/7. Case Study Naked Downloads.mp4
9. Leveraging Firewall Logs.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/9. Leveraging Firewall Logs.mp4
8. Proxies Allow Easy Detection of C2.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/8. Proxies Allow Easy Detection of C2.mp4
4. Mandatory Proxies.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/4. Mandatory Proxies.mp4
10. CIS 6 Audit Logs.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/10. CIS 6 Audit Logs.mp4
2. Leveraging Proxy and Firewall Data.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/2. Leveraging Proxy and Firewall Data.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/1. Course Roadmap.mp4
3. CIS 129 Boundary Defense.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/3. CIS 129 Boundary Defense.mp4
9. Monitoring Service Logs
13 files • 48.03 MB
9. Now Were Logging DNS Whats Next.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/9. Now Were Logging DNS Whats Next.mp4
6. DNS Analytical Logging on Windows 2012R2.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/6. DNS Analytical Logging on Windows 2012R2.mp4
2. Monitoring Service Logs.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/2. Monitoring Service Logs.mp4
12. FirefoxDoH.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/12. FirefoxDoH.mp4
13. ChromeDoH.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/13. ChromeDoH.mp4
5. Enable DNS Query Logging on Windows 20082012.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/5. Enable DNS Query Logging on Windows 20082012.mp4
4. Check Your DNS.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/4. Check Your DNS.mp4
8. Enable Response Logging on Bind 9.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/8. Enable Response Logging on Bind 9.mp4
11. DoH and DoT.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/11. DoH and DoT.mp4
10. DNS over HTTPS DoH and DNS over TLS DoT.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/10. DNS over HTTPS DoH and DNS over TLS DoT.mp4
3. CIS 87 Malware Defenses.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/3. CIS 87 Malware Defenses.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/1. Course Roadmap.mp4
7. Enable Query Logging on Bind 9.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/7. Enable Query Logging on Bind 9.mp4
4. Maintaining Situational Awareness
3 files • 11.16 MB
2. Maintaining Situational Awareness.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/4. Maintaining Situational Awareness/2. Maintaining Situational Awareness.mp4
3. Useful Sites.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/4. Maintaining Situational Awareness/3. Useful Sites.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/4. Maintaining Situational Awareness/1. Course Roadmap.mp4
13. Scripting and Automation
18 files • 44.51 MB
17. Test PowerShell Command.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/17. Test PowerShell Command.mp4
10. DeepBlueCLI.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/10. DeepBlueCLI.mp4
8. Next Step Long Tail Analysis.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/8. Next Step Long Tail Analysis.mp4
16. Use Case SamSam Spreading via WMI and PsExec.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/16. Use Case SamSam Spreading via WMI and PsExec.mp4
5. Windows Registry Startup Keys.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/5. Windows Registry Startup Keys.mp4
2. Importance of Automation.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/2. Importance of Automation.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/1. Course Roadmap.mp4
11. DeepBlueCLI Partial List of Detected Events.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/11. DeepBlueCLI Partial List of Detected Events.mp4
7. Example PowerShell Script.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/7. Example PowerShell Script.mp4
18. Use Case DeepBlueCLI vs PowerShell via WMIC and PsExec.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/18. Use Case DeepBlueCLI vs PowerShell via WMIC and PsExec.mp4
3. Automation Example Windows Startup Registry Keys.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/3. Automation Example Windows Startup Registry Keys.mp4
12. DeepBlueCLI Regex Matching Command Lines.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/12. DeepBlueCLI Regex Matching Command Lines.mp4
13. DeepBlueCLI Whitelist.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/13. DeepBlueCLI Whitelist.mp4
15. Use Case Petya.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/15. Use Case Petya.mp4
14. DeepBlue CLI Base64 andor Compressed Commands.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/14. DeepBlue CLI Base64 andor Compressed Commands.mp4
4. What Does a Malicious Startup Registry Key Look Like.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/4. What Does a Malicious Startup Registry Key Look Like.mp4
9. Then Automate.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/9. Then Automate.mp4
6. Remotely Accessing Registry Keys.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/6. Remotely Accessing Registry Keys.mp4
14. PostIntrusion Detection
5 files • 15.3 MB
5. Kansa Go BigWide or Go Home.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/14. PostIntrusion Detection/5. Kansa Go BigWide or Go Home.mp4
3. Memory Analysis.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/14. PostIntrusion Detection/3. Memory Analysis.mp4
4. Redline.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/14. PostIntrusion Detection/4. Redline.mp4
2. PostIntrusion Detection.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/14. PostIntrusion Detection/2. PostIntrusion Detection.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/14. PostIntrusion Detection/1. Course Roadmap.mp4
7. Vulnerability Scanning
6 files • 21.52 MB
6. VulnWhisperer.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/7. Vulnerability Scanning/6. VulnWhisperer.mp4
2. Vulnerability Scanning.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/7. Vulnerability Scanning/2. Vulnerability Scanning.mp4
3. CIS 31 Vulnerability Scanning.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/7. Vulnerability Scanning/3. CIS 31 Vulnerability Scanning.mp4
5. OpenVAS.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/7. Vulnerability Scanning/5. OpenVAS.mp4
4. Security Content Automation Protocol SCAP.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/7. Vulnerability Scanning/4. Security Content Automation Protocol SCAP.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/7. Vulnerability Scanning/1. Course Roadmap.mp4
8. Monitoring Patching
6 files • 18.22 MB
6. Quick and Dirty Linux Patch Checks.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/8. Monitoring Patching/6. Quick and Dirty Linux Patch Checks.mp4
5. Linux Patch Compliance.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/8. Monitoring Patching/5. Linux Patch Compliance.mp4
3. Standalone Microsoft Patch Scanning.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/8. Monitoring Patching/3. Standalone Microsoft Patch Scanning.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/8. Monitoring Patching/1. Course Roadmap.mp4
4. GetMissingUpdates.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/8. Monitoring Patching/4. GetMissingUpdates.mp4
2. Monitoring Patching.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/8. Monitoring Patching/2. Monitoring Patching.mp4
10. Monitoring Change to Devices and Appliances
5 files • 7.52 MB
4. BuiltIn Change Detection Cisco Routers.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/10. Monitoring Change to Devices and Appliances/4. BuiltIn Change Detection Cisco Routers.mp4
3. Two Approaches to Detect Device Change.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/10. Monitoring Change to Devices and Appliances/3. Two Approaches to Detect Device Change.mp4
2. Monitoring Change in Critical Devices and Appliances.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/10. Monitoring Change to Devices and Appliances/2. Monitoring Change in Critical Devices and Appliances.mp4
1. Course Roadmap.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/10. Monitoring Change to Devices and Appliances/1. Course Roadmap.mp4
5. HowTo Configuration Change Notification and Logging.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/10. Monitoring Change to Devices and Appliances/5. HowTo Configuration Change Notification and Logging.mp4
16. Appendix Centralize Windows Event Logs MBSA
13 files • 1.28 MB
1. Appendix Centralize Windows Event Logs MBSA.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/1. Appendix Centralize Windows Event Logs MBSA.mp4
7. Add Computers to Groups.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/7. Add Computers to Groups.mp4
4. Configuring Centralized Logging 1.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/4. Configuring Centralized Logging 1.mp4
6. Create Two Groups.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/6. Create Two Groups.mp4
3. Collectors and Sources.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/3. Collectors and Sources.mp4
2. Configuring Centralized Windows Event Log Collection.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/2. Configuring Centralized Windows Event Log Collection.mp4
5. Configuring Centralized Logging 2.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/5. Configuring Centralized Logging 2.mp4
12. Complete Subscription.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/12. Complete Subscription.mp4
8. Windows Remote Management.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/8. Windows Remote Management.mp4
9. Enable the Windows Event Collector.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/9. Enable the Windows Event Collector.mp4
13. Default Windows Vista and Newer Settings.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/13. Default Windows Vista and Newer Settings.mp4
10. Creating the Subscription in Event Viewer.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/10. Creating the Subscription in Event Viewer.mp4
11. Choose Events.mp4
SEC511 - Continuous Monitoring and Security Operations/VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/11. Choose Events.mp4
MP3 2020
21 files • 1.59 GB
SEC511_5D_E01.mp3
SEC511 - Continuous Monitoring and Security Operations/MP3 2020/SEC511_5D_E01.mp3
SEC511_3D_E01.mp3
SEC511 - Continuous Monitoring and Security Operations/MP3 2020/SEC511_3D_E01.mp3
SEC511_1D_E01.mp3
SEC511 - Continuous Monitoring and Security Operations/MP3 2020/SEC511_1D_E01.mp3
SEC511_2D_E01.mp3
SEC511 - Continuous Monitoring and Security Operations/MP3 2020/SEC511_2D_E01.mp3
SEC511_4D_E01.mp3
SEC511 - Continuous Monitoring and Security Operations/MP3 2020/SEC511_4D_E01.mp3
SEC511_2A_E01.mp3
SEC511 - Continuous Monitoring and Security Operations/MP3 2020/SEC511_2A_E01.mp3
SEC511_4A_E01.mp3
SEC511 - Continuous Monitoring and Security Operations/MP3 2020/SEC511_4A_E01.mp3
SEC511_5A_E01.mp3
SEC511 - Continuous Monitoring and Security Operations/MP3 2020/SEC511_5A_E01.mp3
SEC511_4B_E01.mp3
SEC511 - Continuous Monitoring and Security Operations/MP3 2020/SEC511_4B_E01.mp3
SEC511_3A_E01.mp3
SEC511 - Continuous Monitoring and Security Operations/MP3 2020/SEC511_3A_E01.mp3
SEC511_2B_E01.mp3
SEC511 - Continuous Monitoring and Security Operations/MP3 2020/SEC511_2B_E01.mp3
SEC511_2C_E01.mp3
SEC511 - Continuous Monitoring and Security Operations/MP3 2020/SEC511_2C_E01.mp3
SEC511_3B_E01.mp3
SEC511 - Continuous Monitoring and Security Operations/MP3 2020/SEC511_3B_E01.mp3
SEC511_1A_E01.mp3
SEC511 - Continuous Monitoring and Security Operations/MP3 2020/SEC511_1A_E01.mp3
SEC511_1B_E01.mp3
SEC511 - Continuous Monitoring and Security Operations/MP3 2020/SEC511_1B_E01.mp3
SEC511_1C_E01.mp3
SEC511 - Continuous Monitoring and Security Operations/MP3 2020/SEC511_1C_E01.mp3
SEC511_5C_E01.mp3
SEC511 - Continuous Monitoring and Security Operations/MP3 2020/SEC511_5C_E01.mp3
SEC511_3C_E01.mp3
SEC511 - Continuous Monitoring and Security Operations/MP3 2020/SEC511_3C_E01.mp3
SEC511_5B_E01.mp3
SEC511 - Continuous Monitoring and Security Operations/MP3 2020/SEC511_5B_E01.mp3
SEC511_4C_E01.mp3
SEC511 - Continuous Monitoring and Security Operations/MP3 2020/SEC511_4C_E01.mp3
SEC511_6A_E01.mp3
SEC511 - Continuous Monitoring and Security Operations/MP3 2020/SEC511_6A_E01.mp3
PDF 2020
1 files • 42.33 MB
SEC511_E01_01_16905.pdf
SEC511 - Continuous Monitoring and Security Operations/PDF 2020/SEC511_E01_01_16905.pdf
Trackers (15)
udp://tracker.breizh.pm:6969/announce
udp://tracker.torrent.eu.org:451/announce
udp://www.torrent.eu.org:451/announce
udp://tracker.opentrackr.org:1337/announce
udp://bubu.mapfactor.com:6969/announce
udp://open.stealth.si:80/announce
udp://pow7.com:80/announce
udp://exodus.desync.com:6969/announce
udp://tracker.theoks.net:6969/announce
udp://bt2.archive.org:6969/announce
udp://bt1.archive.org:6969/announce
udp://tracker.ololosh.space:6969/announce
udp://explodie.org:6969/announce
udp://tracker.dler.com:6969/announce
udp://tracker2.dler.com:80/announce
Similar Torrents 15
Based on tags and category