| - | 001. Learning objectives.mp4 | 387819 | | 54.805011 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:06:42 |
| - | 002. 6.1 Describing Endpoint-based Attacks.mp4 | 4177364 | | 592.575986 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:06:44 |
| - | 003. 6.2 Understanding Data Normalization.mp4 | 1271954 | | 180.309002 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:06:44 |
| - | 004. 6.3 Deconstructing Universal Data Formats.mp4 | 1323827 | | 187.669002 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:06:45 |
| - | 005. 6.4 Understanding the 5-tuple Correlation.mp4 | 914391 | | 129.578685 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:06:47 |
| - | 006. 6.5 Performing DNS Analysis.mp4 | 647662 | | 91.732993 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:06:48 |
| - | 007. 6.6 Performing Web Log Analysis.mp4 | 1834539 | | 260.138685 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:06:49 |
| - | 008. 6.7 Performing Deterministic and Probabilistic Analysis.mp4 | 841736 | | 119.274671 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:06:50 |
| - | 009. 6.8 Understanding Security Monitoring Fundamentals.mp4 | 1139244 | | 161.471995 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:06:51 |
| - | 010. 6.9 Surveying Security Monitoring Tools.mp4 | 1183426 | | 167.743991 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:06:52 |
| - | 011. 6.10 Grasping Security Monitoring Operational Challenges.mp4 | 5698719 | | 808.469002 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:06:53 |