| - | 001. Learning objectives en.srt | 1188 | | | | | | | | srt | | | srt | 2023-08-23 17:36:19 |
| - | 001. Learning objectives.mp4 | 6080052 | | 59.350204 | 819 | 686 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 15:50:55 |
| - | 002. 1.1 Describing the CIA Triad en.srt | 4429 | | | | | | | | srt | | | srt | 2023-08-23 17:36:20 |
| - | 002. 1.1 Describing the CIA Triad.mp4 | 6708211 | | 180.117188 | 297 | 164 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 15:50:56 |
| - | 003. 1.2 Comparing Security Deployments Network, Endpoint, and Application Security Systems en.srt | 1898 | | | | | | | | srt | | | srt | 2023-08-23 17:36:20 |
| - | 003. 1.2 Comparing Security Deployments Network, Endpoint, and Application Security Systems.mp4 | 13013355 | | 98.127528 | 1060 | 928 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 15:50:57 |
| - | 004. 1.3 Comparing Security Deployments Agentless and Agent-based Protections en.srt | 6822 | | | | | | | | srt | | | srt | 2023-08-23 17:36:21 |
| - | 004. 1.3 Comparing Security Deployments Agentless and Agent-based Protections.mp4 | 11985739 | | 259.900952 | 368 | 235 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 15:50:59 |
| - | 005. 1.4 Comparing Security Deployments Legacy Antivirus and Antimalware en.srt | 6504 | | | | | | | | srt | | | srt | 2023-08-23 17:36:21 |
| - | 005. 1.4 Comparing Security Deployments Legacy Antivirus and Antimalware.mp4 | 11164761 | | 210.419229 | 424 | 291 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 15:51:00 |
| - | 006. 1.5 Comparing Security Deployments SIEM, SOAR, and Log Management en.srt | 5684 | | | | | | | | srt | | | srt | 2023-08-23 17:36:21 |
| - | 006. 1.5 Comparing Security Deployments SIEM, SOAR, and Log Management.mp4 | 35264427 | | 263.871565 | 1069 | 936 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 15:51:03 |
| - | 007. 1.6 Defining Threat Intelligence en.srt | 6845 | | | | | | | | srt | | | srt | 2023-08-23 17:36:22 |
| - | 007. 1.6 Defining Threat Intelligence.mp4 | 47790340 | | 328.562358 | 1163 | 1030 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 15:51:07 |
| - | 008. 1.7 Defining Threat Hunting en.srt | 11797 | | | | | | | | srt | | | srt | 2023-08-23 17:36:22 |
| - | 008. 1.7 Defining Threat Hunting.mp4 | 29635700 | | 444.940771 | 532 | 399 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 15:51:10 |
| - | 009. 1.8 Understanding Malware Analysis en.srt | 4390 | | | | | | | | srt | | | srt | 2023-08-23 17:36:22 |
| - | 009. 1.8 Understanding Malware Analysis.mp4 | 29519078 | | 207.795374 | 1136 | 1003 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 15:51:12 |
| - | 010. 1.9 Interpreting the Output Report of a Malware Analysis Tool en.srt | 1697 | | | | | | | | srt | | | srt | 2023-08-23 17:36:23 |
| - | 010. 1.9 Interpreting the Output Report of a Malware Analysis Tool.mp4 | 9949514 | | 94.807075 | 839 | 706 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 15:51:14 |
| - | 011. 1.10 Understanding the Different Threat Actor Types en.srt | 5166 | | | | | | | | srt | | | srt | 2023-08-23 17:36:23 |
| - | 011. 1.10 Understanding the Different Threat Actor Types.mp4 | 5939461 | | 188.546032 | 252 | 118 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 15:51:14 |
| - | 012. 1.11 Defining Run Book Automation (RBA) en.srt | 3090 | | | | | | | | srt | | | srt | 2023-08-23 17:36:23 |
| - | 012. 1.11 Defining Run Book Automation (RBA).mp4 | 8904006 | | 133.491519 | 533 | 400 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 15:51:15 |
| - | 013. 1.12 Defining Reverse Engineering en.srt | 6566 | | | | | | | | srt | | | srt | 2023-08-23 17:36:24 |
| - | 013. 1.12 Defining Reverse Engineering.mp4 | 10090474 | | 254.606803 | 317 | 183 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 15:51:16 |
| - | 014. 1.13 Understanding the Sliding Window Anomaly Detection en.srt | 1783 | | | | | | | | srt | | | srt | 2023-08-23 17:36:24 |
| - | 014. 1.13 Understanding the Sliding Window Anomaly Detection.mp4 | 5004563 | | 80.828685 | 495 | 362 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 15:51:17 |