f69dc311a936 // 3.77 TiB free of 3.98 TiB

c File Name Size Date
parent folder--
-001. Learning objectives.mp44194772023-08-23 16:05:41
-002. 1.1 Describing the CIA Triad.mp412701542023-08-23 16:05:42
-003. 1.2 Comparing Security Deployments Network, Endpoint, and Application Security Systems.mp46923352023-08-23 16:05:43
-004. 1.3 Comparing Security Deployments Agentless and Agent-based Protections.mp418324122023-08-23 16:05:43
-005. 1.4 Comparing Security Deployments Legacy Antivirus and Antimalware.mp414837012023-08-23 16:05:44
-006. 1.5 Comparing Security Deployments SIEM, SOAR, and Log Management.mp418603942023-08-23 16:05:45
-007. 1.6 Defining Threat Intelligence.mp423163032023-08-23 16:05:46
-008. 1.7 Defining Threat Hunting.mp431364522023-08-23 16:05:48
-009. 1.8 Understanding Malware Analysis.mp414652102023-08-23 16:05:49
-010. 1.9 Interpreting the Output Report of a Malware Analysis Tool.mp46689352023-08-23 16:05:49
-011. 1.10 Understanding the Different Threat Actor Types.mp413295542023-08-23 16:05:50
-012. 1.11 Defining Run Book Automation (RBA).mp49415552023-08-23 16:05:51
-013. 1.12 Defining Reverse Engineering.mp417951022023-08-23 16:05:52
-014. 1.13 Understanding the Sliding Window Anomaly Detection.mp45704262023-08-23 16:05:53

control-panel