| - | 001. Learning objectives.mp4 | 419477 | | 59.285011 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:05:41 |
| - | 002. 1.1 Describing the CIA Triad.mp4 | 1270154 | | 180.052993 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:05:42 |
| - | 003. 1.2 Comparing Security Deployments Network, Endpoint, and Application Security Systems.mp4 | 692335 | | 98.069002 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:05:43 |
| - | 004. 1.3 Comparing Security Deployments Agentless and Agent-based Protections.mp4 | 1832412 | | 259.84 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:05:43 |
| - | 005. 1.4 Comparing Security Deployments Legacy Antivirus and Antimalware.mp4 | 1483701 | | 210.368005 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:05:44 |
| - | 006. 1.5 Comparing Security Deployments SIEM, SOAR, and Log Management.mp4 | 1860394 | | 263.808005 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:05:45 |
| - | 007. 1.6 Defining Threat Intelligence.mp4 | 2316303 | | 328.511995 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:05:46 |
| - | 008. 1.7 Defining Threat Hunting.mp4 | 3136452 | | 444.885011 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:05:48 |
| - | 009. 1.8 Understanding Malware Analysis.mp4 | 1465210 | | 207.743991 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:05:49 |
| - | 010. 1.9 Interpreting the Output Report of a Malware Analysis Tool.mp4 | 668935 | | 94.740998 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:05:49 |
| - | 011. 1.10 Understanding the Different Threat Actor Types.mp4 | 1329554 | | 188.48 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:05:50 |
| - | 012. 1.11 Defining Run Book Automation (RBA).mp4 | 941555 | | 133.44 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:05:51 |
| - | 013. 1.12 Defining Reverse Engineering.mp4 | 1795102 | | 254.549002 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:05:52 |
| - | 014. 1.13 Understanding the Sliding Window Anomaly Detection.mp4 | 570426 | | 80.768005 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:05:53 |