Companies Home Search Profile

SEC450 Blue Team Fundamentals Security Operations and Analysis

Focused View

21:00:35

151 View
    1 - Welcome to Blue Team
  • 02.mp4
    03:15
  • 03.mp4
    00:01
  • 04.mp4
    02:27
  • 05.mp4
    00:01
  • 06.mp4
    01:03
  • 07.mp4
    01:05
  • 08.mp4
    01:43
  • 09.mp4
    00:42
  • 10.mp4
    02:14
  • 11.mp4
    05:03
  • 12.mp4
    00:41
  • 13.mp4
    00:50
  • 14.mp4
    01:30
  • 15.mp4
    02:11
  • 16.mp4
    00:46
  • 17.mp4
    01:52
  • 18.mp4
    03:03
  • 19.mp4
    00:25
  • 20.mp4
    00:27
  • 21.mp4
    00:01
  • 22.mp4
    01:21
  • 23.mp4
    00:01
    2 - SOC overview
  • 02.mp4
    00:43
  • 03.mp4
    01:38
  • 04.mp4
    00:43
  • 05.mp4
    02:26
  • 06.mp4
    00:45
  • 07.mp4
    03:14
  • 08.mp4
    00:08
  • 09.mp4
    00:33
  • 10.mp4
    02:54
  • 11.mp4
    01:01
  • 12.mp4
    01:13
  • 13.mp4
    00:28
  • 14.mp4
    02:00
  • 15.mp4
    00:32
  • 16.mp4
    00:41
  • 17.mp4
    02:11
  • 18.mp4
    00:53
  • 19.mp4
    01:34
  • 20.mp4
    02:01
  • 21.mp4
    04:20
  • 22.mp4
    00:44
  • 24.mp4
    00:01
    3 - Defensible network concepts
  • 01.mp4
    00:01
  • 02.mp4
    00:40
  • 03.mp4
    01:48
  • 04.mp4
    02:10
  • 05.mp4
    02:17
  • 06.mp4
    01:38
  • 07.mp4
    01:34
  • 08.mp4
    01:09
  • 09.mp4
    01:30
  • 10.mp4
    01:50
  • 11.mp4
    01:00
  • 12.mp4
    00:42
  • 13.mp4
    02:28
  • 14.mp4
    00:50
  • 15.mp4
    00:11
  • 16.mp4
    00:46
  • 17.mp4
    02:01
  • 18.mp4
    00:32
  • 19.mp4
    00:31
    4 - Events, alerts, anomalies and incidents
  • 02.mp4
    00:43
  • 03.mp4
    00:51
  • 04.mp4
    01:18
  • 05.mp4
    01:18
  • 06.mp4
    03:14
  • 07.mp4
    01:03
  • 08.mp4
    00:36
  • 09.mp4
    01:15
  • 10.mp4
    01:33
  • 11.mp4
    02:22
  • 12.mp4
    01:29
  • 13.mp4
    01:21
  • 14.mp4
    01:12
  • 15.mp4
    05:49
  • 16.mp4
    01:52
  • 17.mp4
    00:38
  • 18.mp4
    01:10
  • 19.mp4
    00:39
  • 20.mp4
    00:36
    5 - Incident management system
  • 01.mp4
    01:01
  • 02.mp4
    00:46
  • 03.mp4
    00:43
  • 04.mp4
    02:46
  • 05.mp4
    01:46
  • 06.mp4
    03:29
  • 07.mp4
    02:12
  • 08.mp4
    00:26
  • 09.mp4
    00:36
  • 10.mp4
    01:28
  • 11.mp4
    01:16
  • 12.mp4
    01:21
  • 13.mp4
    00:24
  • 14.mp4
    01:22
  • 15.mp4
    01:45
  • 16.mp4
    01:13
  • 17.mp4
    01:14
  • 18.mp4
    03:39
  • 19.mp4
    00:39
  • 20.mp4
    03:05
  • 21.mp4
    00:01
  • 22.mp4
    13:22
  • 23.mp4
    02:11
    6 - Threat intelligence platform
  • 01.mp4
    00:59
  • 02.mp4
    01:29
  • 03.mp4
    01:18
  • 04.mp4
    00:49
  • 05.mp4
    01:24
  • 06.mp4
    00:47
  • 07.mp4
    01:31
  • 08.mp4
    01:26
  • 09.mp4
    00:54
  • 10.mp4
    01:27
  • 11.mp4
    01:16
  • 12.mp4
    00:53
  • 13.mp4
    00:32
  • 14.mp4
    01:14
  • 15.mp4
    00:44
  • 16.mp4
    00:40
  • 17.mp4
    00:48
  • 18.mp4
    01:22
  • 19.mp4
    00:37
  • 20.mp4
    00:01
  • 21.mp4
    10:11
  • 22.mp4
    02:04
  • 23.mp4
    01:01
  • 24.mp4
    00:18
    7 - SIEM and automation
  • 01.mp4
    00:11
  • 02.mp4
    00:54
  • 03.mp4
    03:12
  • 04.mp4
    03:18
  • 05.mp4
    01:59
  • 06.mp4
    02:23
  • 07.mp4
    00:48
  • 08.mp4
    00:28
  • 09.mp4
    00:57
  • 10.mp4
    01:06
  • 11.mp4
    00:24
  • 12.mp4
    01:19
  • 13.mp4
    01:08
  • 14.mp4
    01:55
  • 15.mp4
    01:49
  • 16.mp4
    00:30
  • 17.mp4
    00:55
  • 18.mp4
    01:19
  • 19.mp4
    01:23
  • 20.mp4
    01:30
    8 - Know your enemy
  • 01.mp4
    00:01
  • 02.mp4
    00:40
  • 03.mp4
    01:15
  • 04.mp4
    00:38
  • 05.mp4
    01:49
  • 06.mp4
    01:34
  • 07.mp4
    00:25
  • 08.mp4
    01:50
  • 09.mp4
    01:27
  • 10.mp4
    01:13
  • 11.mp4
    02:22
  • 12.mp4
    02:38
  • 13.mp4
    02:35
  • 14.mp4
    00:56
  • 15.mp4
    01:44
    9 - Summary
  • 01.mp4
    00:01
  • 02.mp4
    01:29
  • 03.mp4
    00:01
  • 04.mp4
    00:01
  • 05.mp4
    05:56
    1 - Network architecture
  • 01.mp4
    00:21
  • 02.mp4
    04:24
  • 03.mp4
    00:01
  • 04.mp4
    00:09
  • 05.mp4
    00:01
  • 06.mp4
    00:17
  • 06 2.mp4
    00:44
  • 07.mp4
    01:02
  • 08.mp4
    01:49
  • 10.mp4
    01:58
  • 11.mp4
    01:37
  • 12.mp4
    02:18
  • 13.mp4
    01:24
  • 14.mp4
    01:54
  • 15.mp4
    03:06
  • 16.mp4
    01:38
  • 17.mp4
    01:42
  • 18.mp4
    01:42
  • 19.mp4
    00:40
  • 20.mp4
    01:59
  • 21.mp4
    02:37
    2 - Traffic capture and analysis
  • 01.mp4
    00:01
  • 02.mp4
    03:38
  • 03.mp4
    00:46
  • 04.mp4
    00:39
  • 05.mp4
    03:57
  • 06.mp4
    01:29
  • 07.mp4
    00:55
  • 08.mp4
    01:11
  • 09.mp4
    01:29
  • 10.mp4
    01:00
  • 11.mp4
    01:51
  • 12.mp4
    01:38
  • 13.mp4
    00:52
    3 - Understanding DNS
  • 01.mp4
    02:03
  • 02.mp4
    00:56
  • 03.mp4
    01:28
  • 04.mp4
    01:11
  • 05.mp4
    00:32
  • 06.mp4
    02:28
  • 07.mp4
    00:32
  • 08.mp4
    01:20
  • 09.mp4
    02:47
  • 10.mp4
    01:11
  • 11.mp4
    02:23
  • 12.mp4
    00:52
  • 13.mp4
    01:09
  • 14.mp4
    00:01
  • 15.mp4
    00:47
  • 16.mp4
    01:46
  • 17.mp4
    01:23
  • 18.mp4
    00:01
  • 19.mp4
    01:25
    4 - DNS analysis and attacks
  • 01.mp4
    00:01
  • 02.mp4
    00:23
  • 03.mp4
    00:24
  • 04.mp4
    02:53
  • 05.mp4
    02:37
  • 06.mp4
    01:43
  • 07.mp4
    03:17
  • 08.mp4
    04:21
  • 09.mp4
    01:27
  • 10.mp4
    01:56
  • 11.mp4
    03:23
  • 12.mp4
    00:47
  • 13.mp4
    01:37
  • 14.mp4
    01:33
  • 15.mp4
    00:48
  • 16.mp4
    04:01
  • 17.mp4
    01:29
  • 18.mp4
    01:38
  • 19.mp4
    03:29
  • 20.mp4
    05:00
  • 21.mp4
    01:58
  • 22.mp4
    02:17
  • 23.mp4
    00:54
  • 24.mp4
    02:18
  • 25.mp4
    02:32
  • 26.mp4
    02:13
  • 27.mp4
    01:17
  • 28.mp4
    02:34
  • 29.mp4
    01:17
  • 30.mp4
    00:01
  • 31.mp4
    10:43
    5 - Understanding HTTP(S)
  • 01.mp4
    00:15
  • 02.mp4
    01:01
  • 03.mp4
    00:45
  • 04.mp4
    00:35
  • 05.mp4
    00:42
  • 06.mp4
    01:30
  • 07.mp4
    01:07
  • 08.mp4
    01:11
  • 09.mp4
    00:29
  • 09 (1).mp4
    00:29
  • 10.mp4
    01:37
  • 11.mp4
    01:36
  • 12.mp4
    03:00
  • 13.mp4
    01:25
  • 14.mp4
    01:18
  • 15.mp4
    02:14
  • 16.mp4
    01:14
  • 17.mp4
    00:46
  • 18.mp4
    02:19
  • 19.mp4
    01:01
  • 20.mp4
    02:48
  • 21.mp4
    01:32
  • 22.mp4
    02:31
  • 23.mp4
    00:52
  • 24.mp4
    01:22
  • 25.mp4
    00:39
    6 - HTTP analysis and attacks
  • 01.mp4
    00:49
  • 02.mp4
    01:10
  • 03.mp4
    01:11
  • 04.mp4
    00:57
  • 05.mp4
    00:36
  • 06.mp4
    01:28
  • 07.mp4
    00:56
  • 08.mp4
    03:11
  • 09.mp4
    01:01
  • 10.mp4
    03:24
  • 11.mp4
    01:48
  • 12.mp4
    01:44
  • 13.mp4
    02:12
  • 14.mp4
    01:12
  • 15.mp4
    00:28
  • 16.mp4
    00:45
  • 17.mp4
    01:20
  • 18.mp4
    00:01
  • 19.mp4
    02:11
  • 20.mp4
    02:22
  • 21.mp4
    03:38
  • 22.mp4
    00:48
  • 23.mp4
    01:46
  • 24.mp4
    01:06
  • 25.mp4
    02:32
  • 26.mp4
    01:00
  • 27.mp4
    00:01
  • 28.mp4
    03:50
  • 29.mp4
    00:05
    7 - Understanding SMTP and email
  • 01.mp4
    00:38
  • 02.mp4
    00:51
  • 03.mp4
    01:39
  • 04.mp4
    01:53
  • 05.mp4
    00:42
  • 06.mp4
    00:36
  • 07.mp4
    01:46
  • 08.mp4
    00:24
  • 09.mp4
    02:27
  • 10.mp4
    01:06
  • 11.mp4
    00:55
  • 12.mp4
    00:35
  • 13.mp4
    02:23
  • 14.mp4
    00:20
  • 15.mp4
    01:11
  • 16.mp4
    01:34
  • 17.mp4
    01:24
  • 18.mp4
    00:45
  • 19.mp4
    01:27
    8 - Additional network protocols
  • 01.mp4
    00:01
  • 02.mp4
    00:58
  • 03.mp4
    02:43
  • 04.mp4
    01:12
  • 05.mp4
    02:32
  • 06.mp4
    00:33
  • 07.mp4
    02:54
  • 08.mp4
    00:59
  • 09.mp4
    02:06
  • 10.mp4
    02:12
  • 11.mp4
    01:02
  • 12.mp4
    01:07
    9 - Summary
  • 01.mp4
    00:01
  • 02.mp4
    00:29
  • 03.mp4
    00:01
  • 04.mp4
    05:22
    1 - Endpoint attack tactics
  • 01.mp4
    00:25
  • 02.mp4
    03:52
  • 03.mp4
    00:31
  • 04.mp4
    00:01
  • 05.mp4
    00:01
  • 06.mp4
    00:58
  • 07.mp4
    01:09
  • 08.mp4
    02:10
  • 09.mp4
    01:34
  • 10.mp4
    02:13
  • 11.mp4
    01:23
  • 12.mp4
    00:50
  • 13.mp4
    03:17
  • 14.mp4
    01:19
  • 15.mp4
    01:52
  • 16.mp4
    01:52
  • 17.mp4
    02:08
  • 18.mp4
    01:56
  • 19.mp4
    01:35
  • 20.mp4
    05:17
  • 21.mp4
    00:09
  • 22.mp4
    02:33
  • 23.mp4
    01:24
  • 24.mp4
    00:54
  • 25.mp4
    02:01
  • 26.mp4
    00:55
  • 27.mp4
    00:38
  • 28.mp4
    00:57
    2 - Endpoint Defense in Depth
  • 01.mp4
    00:11
  • 02.mp4
    01:15
  • 03.mp4
    01:32
  • 04.mp4
    01:44
  • 05.mp4
    04:05
  • 06.mp4
    01:36
  • 07.mp4
    01:29
  • 08.mp4
    00:54
  • 09.mp4
    02:51
  • 10.mp4
    00:41
  • 11.mp4
    03:16
  • 12.mp4
    02:52
  • 13.mp4
    02:53
  • 14.mp4
    01:20
  • 15.mp4
    01:26
  • 16.mp4
    04:44
  • 17.mp4
    02:37
  • 18.mp4
    01:18
  • 19.mp4
    02:38
  • 20.mp4
    01:47
  • 21.mp4
    00:50
  • 22.mp4
    00:50
    3 - How windows logging works
  • 01.mp4
    00:30
  • 02.mp4
    01:37
  • 03.mp4
    00:54
  • 04.mp4
    01:14
  • 05.mp4
    00:46
  • 06.mp4
    01:48
  • 07.mp4
    00:38
  • 08.mp4
    00:09
  • 09.mp4
    03:43
  • 10.mp4
    00:11
  • 11.mp4
    00:13
  • 12.mp4
    02:03
  • 13.mp4
    01:07
  • 14.mp4
    00:30
    4 - How linux logging works
  • 01.mp4
    01:22
  • 02.mp4
    01:09
  • 03.mp4
    00:57
  • 04.mp4
    01:17
  • 05.mp4
    01:24
  • 06.mp4
    00:55
  • 07.mp4
    01:40
  • 08.mp4
    01:55
  • 09.mp4
    01:00
  • 10.mp4
    00:47
  • 11.mp4
    00:43
  • 12.mp4
    00:39
  • 13.mp4
    00:01
  • 14.mp4
    00:56
    5 - Interpreting important events
  • 01.mp4
    00:09
  • 02.mp4
    04:08
  • 03.mp4
    01:13
  • 04.mp4
    00:53
  • 05.mp4
    00:41
  • 06.mp4
    02:42
  • 07.mp4
    02:12
  • 08.mp4
    00:34
  • 09.mp4
    01:01
  • 10.mp4
    00:42
  • 11.mp4
    00:59
  • 12.mp4
    01:57
  • 13.mp4
    00:31
  • 14.mp4
    02:20
  • 15.mp4
    01:19
  • 16.mp4
    01:17
  • 17.mp4
    01:28
  • 18.mp4
    01:57
  • 19.mp4
    01:07
  • 20.mp4
    02:54
  • 21.mp4
    01:06
  • 22.mp4
    01:29
  • 23.mp4
    01:06
  • 24.mp4
    01:17
  • 25.mp4
    00:06
  • 26.mp4
    02:16
  • 27.mp4
    00:50
  • 28.mp4
    00:01
  • 29.mp4
    10:44
    6 - Log collection, parsing and normalization
  • 01.mp4
    00:54
  • 02.mp4
    00:40
  • 03.mp4
    00:54
  • 04.mp4
    01:23
  • 05.mp4
    02:49
  • 06.mp4
    01:40
  • 07.mp4
    00:34
  • 08.mp4
    03:24
  • 09.mp4
    01:13
  • 10.mp4
    02:08
  • 11.mp4
    02:26
  • 12.mp4
    01:25
  • 13.mp4
    01:19
  • 14.mp4
    02:24
  • 15.mp4
    02:08
  • 16.mp4
    01:26
  • 17.mp4
    01:04
  • 18.mp4
    02:44
  • 19.mp4
    01:01
  • 20.mp4
    00:01
  • 21.mp4
    08:37
    7 - File contents and identification
  • 01.mp4
    01:21
  • 02.mp4
    01:58
  • 03.mp4
    01:18
  • 04.mp4
    02:43
  • 05.mp4
    01:19
  • 06.mp4
    01:17
  • 07.mp4
    01:29
  • 08.mp4
    01:53
  • 09.mp4
    02:16
  • 10.mp4
    01:47
  • 11.mp4
    01:44
  • 12.mp4
    00:53
  • 13.mp4
    00:27
    8 - Identifying and handling suspicious files
  • 02.mp4
    00:43
  • 03.mp4
    01:36
  • 04.mp4
    02:23
  • 05.mp4
    01:03
  • 06.mp4
    01:39
  • 07.mp4
    01:34
  • 08.mp4
    02:18
  • 09.mp4
    01:16
  • 10.mp4
    01:29
  • 11.mp4
    00:56
  • 12.mp4
    01:14
  • 013.mp4
    02:24
  • 13.mp4
    00:01
  • 14.mp4
    01:46
  • 15.mp4
    01:59
  • 16.mp4
    01:23
  • 17.mp4
    00:58
  • 18.mp4
    01:18
  • 19.mp4
    01:13
  • 20.mp4
    01:11
  • 21.mp4
    01:54
  • 22.mp4
    01:03
  • 23.mp4
    01:52
    9 - Summary
  • 01.mp4
    00:01
  • 02.mp4
    01:01
  • 03.mp4
    02:44
    1 - Alert triage and prioritization
  • 01.mp4
    00:59
  • 02.mp4
    02:12
  • 03.mp4
    00:01
  • 04.mp4
    00:41
  • 04 2.mp4
    00:47
  • 05.mp4
    00:01
  • 06.mp4
    01:02
  • 07.mp4
    01:44
  • 08.mp4
    00:54
  • 10.mp4
    01:38
  • 11.mp4
    05:29
  • 12.mp4
    01:51
  • 13.mp4
    01:28
  • 14.mp4
    01:31
  • 15.mp4
    06:14
  • 16.mp4
    00:29
  • 17.mp4
    06:09
  • 18.mp4
    01:11
  • 19.mp4
    01:52
  • 20.mp4
    02:56
  • 21.mp4
    00:35
    2 - Perception memory and investigation
  • 01.mp4
    00:14
  • 02.mp4
    01:10
  • 03.mp4
    00:14
  • 04.mp4
    00:51
  • 05.mp4
    01:25
  • 06.mp4
    00:56
  • 07.mp4
    03:12
  • 08.mp4
    00:46
  • 09.mp4
    00:25
  • 10.mp4
    00:33
  • 11.mp4
    01:01
  • 12.mp4
    00:55
  • 13.mp4
    00:34
  • 14.mp4
    00:26
  • 15.mp4
    01:32
  • 16.mp4
    01:01
  • 17.mp4
    00:24
  • 18.mp4
    01:45
  • 19.mp4
    00:39
  • 20.mp4
    01:18
  • 21.mp4
    00:56
    3 - Modules and concepts for infosec
  • 01.mp4
    00:48
  • 02.mp4
    00:54
  • 03.mp4
    01:11
  • 04.mp4
    00:07
  • 04 2.mp4
    01:04
  • 05.mp4
    00:55
  • 06.mp4
    01:06
  • 07.mp4
    00:23
  • 08.mp4
    01:49
  • 10.mp4
    02:15
  • 11.mp4
    01:23
  • 12.mp4
    02:07
  • 13.mp4
    01:34
  • 14.mp4
    02:00
  • 15.mp4
    00:50
  • 16.mp4
    01:29
  • 17.mp4
    03:50
  • 18.mp4
    01:52
  • 19.mp4
    03:41
  • 20.mp4
    03:32
  • 21.mp4
    02:10
  • 22.mp4
    01:11
  • 23.mp4
    00:34
  • 24.mp4
    00:33
  • 25.mp4
    00:01
  • 26.mp4
    07:31
    4 - Structured analyticsal techniques
  • 01.mp4
    00:08
  • 02.mp4
    00:38
  • 03.mp4
    01:25
  • 04.mp4
    01:10
  • 05.mp4
    01:14
  • 06.mp4
    00:52
  • 07.mp4
    00:48
  • 08.mp4
    02:13
  • 09.mp4
    01:08
  • 10.mp4
    01:06
  • 11.mp4
    02:33
  • 12.mp4
    03:36
  • 13.mp4
    01:05
  • 14.mp4
    00:51
  • 15.mp4
    02:45
  • 16.mp4
    01:44
  • 17.mp4
    01:45
  • 18.mp4
    01:28
  • 19.mp4
    00:21
  • 20.mp4
    01:15
  • 21.mp4
    01:17
  • 22.mp4
    00:52
    5 - Analysis questions and tactics
  • 01.mp4
    01:25
  • 02.mp4
    01:32
  • 03.mp4
    01:26
  • 04.mp4
    00:01
  • 04 2.mp4
    02:04
  • 05.mp4
    03:07
  • 06.mp4
    01:12
  • 07.mp4
    00:27
  • 08.mp4
    01:43
  • 10.mp4
    00:41
  • 11.mp4
    02:00
  • 12.mp4
    01:18
  • 13.mp4
    03:27
  • 14.mp4
    01:08
  • 15.mp4
    01:12
  • 16.mp4
    01:05
  • 17.mp4
    01:30
  • 18.mp4
    02:53
  • 19.mp4
    01:04
  • 20.mp4
    01:43
  • 21.mp4
    03:11
  • 22.mp4
    01:37
  • 23.mp4
    05:06
  • 24.mp4
    03:06
  • 25.mp4
    00:56
  • 26.mp4
    01:12
  • 27.mp4
    00:50
  • 28.mp4
    01:29
  • 29.mp4
    01:32
  • 30.mp4
    00:57
  • 31.mp4
    02:46
  • 32.mp4
    00:34
    6 - Analysis opsec
  • 01.mp4
    00:05
  • 02.mp4
    00:48
  • 03.mp4
    00:33
  • 04.mp4
    01:32
  • 05.mp4
    00:56
  • 06.mp4
    00:59
  • 07.mp4
    01:41
  • 08.mp4
    02:15
  • 09.mp4
    01:04
  • 10.mp4
    00:35
  • 11.mp4
    01:01
  • 12.mp4
    01:34
  • 13.mp4
    03:16
  • 14.mp4
    01:38
  • 15.mp4
    00:49
  • 16.mp4
    00:01
  • 17.mp4
    04:31
    7 - Intrusion discovery
  • 01.mp4
    01:29
  • 02.mp4
    00:59
  • 03.mp4
    02:03
  • 04.mp4
    00:15
  • 04 2.mp4
    01:06
  • 05.mp4
    00:52
  • 06.mp4
    01:36
  • 07.mp4
    01:51
  • 08.mp4
    00:44
  • 10.mp4
    01:48
  • 11.mp4
    00:47
  • 12.mp4
    00:49
  • 13.mp4
    00:45
  • 14.mp4
    01:43
  • 15.mp4
    01:23
  • 16.mp4
    00:40
  • 17.mp4
    00:44
    1 - Improving life in the SOC
  • 01.mp4
    00:01
  • 02.mp4
    00:01
  • 03.mp4
    01:18
  • 04.mp4
    00:01
  • 05.mp4
    00:34
  • 06.mp4
    00:42
  • 07.mp4
    00:34
  • 08.mp4
    00:57
  • 09.mp4
    01:01
  • 10.mp4
    01:10
  • 11.mp4
    00:51
  • 12.mp4
    01:17
  • 13.mp4
    03:54
  • 14.mp4
    01:50
  • 15.mp4
    01:08
  • 16.mp4
    00:16
  • 17.mp4
    01:32
  • 18.mp4
    01:49
  • 19.mp4
    00:41
  • 20.mp4
    01:05
  • 21.mp4
    02:23
  • 22.mp4
    03:34
  • 23.mp4
    01:36
  • 24.mp4
    02:29
  • 25.mp4
    00:08
    2 - Analytic features and enrichment
  • 01.mp4
    00:01
  • 02.mp4
    01:29
  • 03.mp4
    00:55
  • 04.mp4
    00:57
  • 05.mp4
    00:48
  • 06.mp4
    00:21
  • 07.mp4
    01:37
  • 08.mp4
    02:31
  • 09.mp4
    00:22
  • 10.mp4
    00:53
  • 11.mp4
    03:09
  • 12.mp4
    01:15
  • 13.mp4
    01:39
  • 14.mp4
    01:52
  • 15.mp4
    03:12
  • 16.mp4
    02:27
  • 17.mp4
    01:25
  • 18.mp4
    01:38
  • 19.mp4
    00:45
  • 20.mp4
    01:04
    3 - New analytic design, testing and sharing
  • 01.mp4
    00:01
  • 02.mp4
    00:58
  • 03.mp4
    01:09
  • 04.mp4
    01:28
  • 05.mp4
    01:08
  • 06.mp4
    02:16
  • 07.mp4
    00:48
  • 08.mp4
    01:38
  • 09.mp4
    00:31
  • 10.mp4
    02:42
  • 11.mp4
    02:14
  • 12.mp4
    02:20
  • 13.mp4
    01:08
  • 14.mp4
    04:12
  • 15.mp4
    01:52
  • 16.mp4
    01:11
  • 17.mp4
    02:24
  • 18.mp4
    00:53
  • 19.mp4
    03:13
  • 20.mp4
    03:24
  • 21.mp4
    01:09
  • 22.mp4
    00:56
  • 23.mp4
    01:20
  • 24.mp4
    01:28
  • 25.mp4
    00:53
  • 26.mp4
    00:47
  • 27.mp4
    02:21
  • 28.mp4
    01:33
  • 29.mp4
    00:46
  • 30.mp4
    00:56
  • 31.mp4
    02:00
  • 32.mp4
    01:15
    4 - Tuning and false positive reduction
  • 01.mp4
    00:31
  • 02.mp4
    00:38
  • 03.mp4
    01:32
  • 04.mp4
    01:47
  • 05.mp4
    01:16
  • 06.mp4
    00:33
  • 07.mp4
    00:56
  • 08.mp4
    01:16
  • 09.mp4
    01:53
  • 10.mp4
    00:40
  • 11.mp4
    00:51
  • 12.mp4
    02:25
  • 13.mp4
    00:55
  • 14.mp4
    01:57
  • 15.mp4
    01:29
  • 16.mp4
    01:06
  • 17.mp4
    00:36
  • 18.mp4
    01:18
  • 19.mp4
    00:53
  • 20.mp4
    00:49
  • 21.mp4
    01:11
  • 22.mp4
    00:47
  • 23.mp4
    00:20
  • 24.mp4
    00:36
  • 25.mp4
    01:07
  • 26.mp4
    00:01
  • 27.mp4
    00:32
  • 28.mp4
    01:14
  • 29.mp4
    00:48
  • 30.mp4
    00:01
  • 31.mp4
    06:21
    5 - Automation and orchestration
  • 01.mp4
    00:18
  • 02.mp4
    00:25
  • 03.mp4
    00:37
  • 04.mp4
    03:28
  • 05.mp4
    01:09
  • 06.mp4
    02:20
  • 07.mp4
    00:27
  • 08.mp4
    01:03
  • 09.mp4
    02:13
  • 10.mp4
    01:52
  • 11.mp4
    01:51
  • 12.mp4
    00:58
  • 13.mp4
    01:36
  • 14.mp4
    01:15
  • 15.mp4
    00:58
  • 16.mp4
    00:09
    6 - Improving operational efficiency and workflow
  • 01.mp4
    00:09
  • 02.mp4
    00:54
  • 03.mp4
    00:42
  • 04.mp4
    00:52
  • 05.mp4
    01:10
  • 06.mp4
    00:42
  • 07.mp4
    02:10
  • 08.mp4
    00:28
  • 09.mp4
    01:04
  • 10.mp4
    00:58
  • 11.mp4
    01:36
  • 12.mp4
    01:05
  • 13.mp4
    00:28
  • 14.mp4
    00:01
  • 15.mp4
    09:33
    7 - Containing identified instrusions
  • 01.mp4
    00:31
  • 02.mp4
    00:46
  • 03.mp4
    00:47
  • 04.mp4
    01:59
  • 05.mp4
    00:33
  • 06.mp4
    01:15
  • 07.mp4
    01:23
  • 08.mp4
    03:14
  • 09.mp4
    00:42
  • 10.mp4
    01:30
  • 11.mp4
    01:07
  • 12.mp4
    01:33
  • 13.mp4
    00:12
  • 14.mp4
    00:55
  • 15.mp4
    00:34
  • 16.mp4
    00:53
  • 17.mp4
    00:34
  • 18.mp4
    01:01
  • 19.mp4
    02:38
  • 20.mp4
    00:49
  • 21.mp4
    01:28
  • 22.mp4
    00:56
  • 23.mp4
    02:16
  • 24.mp4
    02:10
  • 25.mp4
    00:59
  • 26.mp4
    00:39
  • 27.mp4
    00:01
  • 28.mp4
    00:38
    8 - Skill and career development
  • 01.mp4
    00:26
  • 02.mp4
    00:51
  • 03.mp4
    03:23
  • 04.mp4
    01:48
  • 05.mp4
    01:37
  • 06.mp4
    02:45
  • 07.mp4
    01:20
  • 08.mp4
    00:45
  • 09.mp4
    00:39
  • 10.mp4
    01:31
  • 11.mp4
    00:33
  • 12.mp4
    00:52
  • 13.mp4
    01:34
  • 14.mp4
    02:26
  • 15.mp4
    01:31
  • 16.mp4
    00:48

More details


User Reviews
Rating
0
0
0
0
0
average 0
Total votes0
Focused display
The SANS Institute is a private U.S. for-profit company founded in 1989 that specializes in information security, cybersecurity training, and selling certificates. Topics available for training include cyber and network defenses, penetration testing, incident response, digital forensics, and auditing.
  • language english
  • Training sessions 849
  • duration 21:00:35
  • Release Date 2023/07/05

Courses related to Ethical Hacking

Courses related to Penetration Testing

Courses related to Network Security

Courses related to Computer Network

Courses related to Network Engineering