SEC511 Continuous Monitoring and Security Operations
Focused View
30:12:58
161 View
1. Course Overview.mp4
01:10:13
2. Current State Assessment.mp4
34:55
3. Adversarial Dominance.mp4
10:47
4. Traditional Attack Techniques.mp4
17:14
5. Traditional Cyber Defense.mp4
49:17
6. Modern Attack Techniques.mp4
14:16
7. Client-Side Attack Vectors.mp4
33:46
8. Client-Side Targets.mp4
10:39
9. Post-Exploitation.mp4
18:09
10. Modern Cyber Defense Principles.mp4
16:16
11. Adversary Informed Detection.mp4
24:56
12. Security Operations Centers.mp4
32:53
13. Section One Summary.mp4
12:55
1. Network Security Architecture.mp4
38:02
2. Routers.mp4
30:52
3. Perimeter SI Firewalls.mp4
28:45
4. Web Application Firewalls.mp4
25:52
5. Forward Proxies.mp4
30:09
6. Encryption and TLS Inspection.mp4
26:00
7. Network Intrusion Detection Systems.mp4
20:16
8. Network Intrusion Prevention Systems.mp4
07:25
9. Next-Generation Firewalls.mp4
25:15
10. Malware Detonation Devices.mp4
17:49
11. Entropy and freqpy.mp4
27:13
12. Security Information and Event Management SIEM.mp4
17:03
13. Adversary Deception Devices.mp4
10:34
14. Switches. PVLAN Security.mp4
11:01
15. Threat Intelligence.mp4
15:48
16. Section 2 Summary.mp4
22:08
1. Getting Started.mp4
05:47
2. Network Security Monitoring Overview.mp4
26:21
3. Evolution of NSM.mp4
16:47
4. The NSM Toolbox.mp4
33:35
5. NIDS Design.mp4
25:37
6. Analysis Methodology.mp4
12:48
7. NSM Data Sources.mp4
01:01:17
8. Practical NSM Issues.mp4
31:07
9. Cornerstone NSM.mp4
28:33
10. Tracking EXEs.mp4
20:42
11. Identifying Command and Control Traffic.mp4
44:07
12. Tracking User Agents.mp4
14:04
13. C2 via HTTPS.mp4
10:23
14. Tracking Encryption Certificates.mp4
14:10
15. Section 3 Summary.mp4
07:45
1. Endpoint Security Architecture Overview.mp4
12:28
2. Windows Endpoints.mp4
07:24
3. Patching.mp4
16:42
4. Secure Baseline Configuration.mp4
19:54
5. EMET and Windows Defender Exploit Guard.mp4
14:32
6. Application Monitoring and Sysmon.mp4
45:01
7. Application Whitelisting.mp4
42:04
8. Administrative Accounts.mp4
25:39
9. Privilege Monitoring.mp4
24:22
10. Privilege Reduction.mp4
18:22
11. Authentication.mp4
22:25
12. Security Support Provider.mp4
12:28
13. Post-Authentication.mp4
07:28
14. Advanced Authentication Attacks.mp4
18:46
15. Endpoint Protection Platforms EPP.mp4
23:46
16. Section 4 Summary.mp4
06:41
1. Continuous Security Monitoring Overview.mp4
31:00
2. Industry Best Practices.mp4
21:15
3. Winning CSM Techniques.mp4
34:58
4. Maintaining Situational Awareness.mp4
04:37
5. Host and Service Discovery.mp4
15:30
6. Passive OS Detection.mp4
20:03
7. Vulnerability Scanning.mp4
10:16
8. Monitoring Patching.mp4
08:04
9. Monitoring Service Logs.mp4
22:05
10. Monitoring Change to Devices and Appliances.mp4
02:59
11. Leveraging Proxy and Firewall Data.mp4
12:56
12. Monitoring Critical Windows Events.mp4
01:00:03
13. Scripting and Automation.mp4
19:00
14. Post-Intrusion Detection.mp4
05:56
15. Section 5 Summary.mp4
11:51
16. Appendix Centralize Windows Event Logs MBSA.mp4
00:16
1. Capstone Design Detect Defend.mp4
02:40:36
More details
User Reviews
Rating
average 0
Focused display

Sans
View courses SansThe SANS Institute is a private U.S. for-profit company founded in 1989 that specializes in information security, cybersecurity training, and selling certificates. Topics available for training include cyber and network defenses, penetration testing, incident response, digital forensics, and auditing.
- language english
- Training sessions 77
- duration 30:12:58
- Release Date 2023/07/05