Companies Home Search Profile

SEC511 Continuous Monitoring and Security Operations

Focused View

30:12:58

161 View
  • 1. Course Overview.mp4
    01:10:13
  • 2. Current State Assessment.mp4
    34:55
  • 3. Adversarial Dominance.mp4
    10:47
  • 4. Traditional Attack Techniques.mp4
    17:14
  • 5. Traditional Cyber Defense.mp4
    49:17
  • 6. Modern Attack Techniques.mp4
    14:16
  • 7. Client-Side Attack Vectors.mp4
    33:46
  • 8. Client-Side Targets.mp4
    10:39
  • 9. Post-Exploitation.mp4
    18:09
  • 10. Modern Cyber Defense Principles.mp4
    16:16
  • 11. Adversary Informed Detection.mp4
    24:56
  • 12. Security Operations Centers.mp4
    32:53
  • 13. Section One Summary.mp4
    12:55
  • 1. Network Security Architecture.mp4
    38:02
  • 2. Routers.mp4
    30:52
  • 3. Perimeter SI Firewalls.mp4
    28:45
  • 4. Web Application Firewalls.mp4
    25:52
  • 5. Forward Proxies.mp4
    30:09
  • 6. Encryption and TLS Inspection.mp4
    26:00
  • 7. Network Intrusion Detection Systems.mp4
    20:16
  • 8. Network Intrusion Prevention Systems.mp4
    07:25
  • 9. Next-Generation Firewalls.mp4
    25:15
  • 10. Malware Detonation Devices.mp4
    17:49
  • 11. Entropy and freqpy.mp4
    27:13
  • 12. Security Information and Event Management SIEM.mp4
    17:03
  • 13. Adversary Deception Devices.mp4
    10:34
  • 14. Switches. PVLAN Security.mp4
    11:01
  • 15. Threat Intelligence.mp4
    15:48
  • 16. Section 2 Summary.mp4
    22:08
  • 1. Getting Started.mp4
    05:47
  • 2. Network Security Monitoring Overview.mp4
    26:21
  • 3. Evolution of NSM.mp4
    16:47
  • 4. The NSM Toolbox.mp4
    33:35
  • 5. NIDS Design.mp4
    25:37
  • 6. Analysis Methodology.mp4
    12:48
  • 7. NSM Data Sources.mp4
    01:01:17
  • 8. Practical NSM Issues.mp4
    31:07
  • 9. Cornerstone NSM.mp4
    28:33
  • 10. Tracking EXEs.mp4
    20:42
  • 11. Identifying Command and Control Traffic.mp4
    44:07
  • 12. Tracking User Agents.mp4
    14:04
  • 13. C2 via HTTPS.mp4
    10:23
  • 14. Tracking Encryption Certificates.mp4
    14:10
  • 15. Section 3 Summary.mp4
    07:45
  • 1. Endpoint Security Architecture Overview.mp4
    12:28
  • 2. Windows Endpoints.mp4
    07:24
  • 3. Patching.mp4
    16:42
  • 4. Secure Baseline Configuration.mp4
    19:54
  • 5. EMET and Windows Defender Exploit Guard.mp4
    14:32
  • 6. Application Monitoring and Sysmon.mp4
    45:01
  • 7. Application Whitelisting.mp4
    42:04
  • 8. Administrative Accounts.mp4
    25:39
  • 9. Privilege Monitoring.mp4
    24:22
  • 10. Privilege Reduction.mp4
    18:22
  • 11. Authentication.mp4
    22:25
  • 12. Security Support Provider.mp4
    12:28
  • 13. Post-Authentication.mp4
    07:28
  • 14. Advanced Authentication Attacks.mp4
    18:46
  • 15. Endpoint Protection Platforms EPP.mp4
    23:46
  • 16. Section 4 Summary.mp4
    06:41
  • 1. Continuous Security Monitoring Overview.mp4
    31:00
  • 2. Industry Best Practices.mp4
    21:15
  • 3. Winning CSM Techniques.mp4
    34:58
  • 4. Maintaining Situational Awareness.mp4
    04:37
  • 5. Host and Service Discovery.mp4
    15:30
  • 6. Passive OS Detection.mp4
    20:03
  • 7. Vulnerability Scanning.mp4
    10:16
  • 8. Monitoring Patching.mp4
    08:04
  • 9. Monitoring Service Logs.mp4
    22:05
  • 10. Monitoring Change to Devices and Appliances.mp4
    02:59
  • 11. Leveraging Proxy and Firewall Data.mp4
    12:56
  • 12. Monitoring Critical Windows Events.mp4
    01:00:03
  • 13. Scripting and Automation.mp4
    19:00
  • 14. Post-Intrusion Detection.mp4
    05:56
  • 15. Section 5 Summary.mp4
    11:51
  • 16. Appendix Centralize Windows Event Logs MBSA.mp4
    00:16
  • 1. Capstone Design Detect Defend.mp4
    02:40:36
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    The SANS Institute is a private U.S. for-profit company founded in 1989 that specializes in information security, cybersecurity training, and selling certificates. Topics available for training include cyber and network defenses, penetration testing, incident response, digital forensics, and auditing.
    • language english
    • Training sessions 77
    • duration 30:12:58
    • Release Date 2023/07/05

    Courses related to Cyber Security

    Courses related to Penetration Testing

    Courses related to Network Security

    Courses related to Computer Network

    Courses related to Network Engineering

    Courses related to Ethics