| parent folder | - | - |
| - | 001. Learning objectives.mp4 | 419477 | 2023-08-23 16:05:41 |
| - | 002. 1.1 Describing the CIA Triad.mp4 | 1270154 | 2023-08-23 16:05:42 |
| - | 003. 1.2 Comparing Security Deployments Network, Endpoint, and Application Security Systems.mp4 | 692335 | 2023-08-23 16:05:43 |
| - | 004. 1.3 Comparing Security Deployments Agentless and Agent-based Protections.mp4 | 1832412 | 2023-08-23 16:05:43 |
| - | 005. 1.4 Comparing Security Deployments Legacy Antivirus and Antimalware.mp4 | 1483701 | 2023-08-23 16:05:44 |
| - | 006. 1.5 Comparing Security Deployments SIEM, SOAR, and Log Management.mp4 | 1860394 | 2023-08-23 16:05:45 |
| - | 007. 1.6 Defining Threat Intelligence.mp4 | 2316303 | 2023-08-23 16:05:46 |
| - | 008. 1.7 Defining Threat Hunting.mp4 | 3136452 | 2023-08-23 16:05:48 |
| - | 009. 1.8 Understanding Malware Analysis.mp4 | 1465210 | 2023-08-23 16:05:49 |
| - | 010. 1.9 Interpreting the Output Report of a Malware Analysis Tool.mp4 | 668935 | 2023-08-23 16:05:49 |
| - | 011. 1.10 Understanding the Different Threat Actor Types.mp4 | 1329554 | 2023-08-23 16:05:50 |
| - | 012. 1.11 Defining Run Book Automation (RBA).mp4 | 941555 | 2023-08-23 16:05:51 |
| - | 013. 1.12 Defining Reverse Engineering.mp4 | 1795102 | 2023-08-23 16:05:52 |
| - | 014. 1.13 Understanding the Sliding Window Anomaly Detection.mp4 | 570426 | 2023-08-23 16:05:53 |