f69dc311a936 // 3.77 TiB free of 3.98 TiB

c File Name Size Date
parent folder--
-001. Learning objectives en.srt11882023-08-23 17:36:19
-001. Learning objectives.mp460800522023-08-23 15:50:55
-002. 1.1 Describing the CIA Triad en.srt44292023-08-23 17:36:20
-002. 1.1 Describing the CIA Triad.mp467082112023-08-23 15:50:56
-003. 1.2 Comparing Security Deployments Network, Endpoint, and Application Security Systems en.srt18982023-08-23 17:36:20
-003. 1.2 Comparing Security Deployments Network, Endpoint, and Application Security Systems.mp4130133552023-08-23 15:50:57
-004. 1.3 Comparing Security Deployments Agentless and Agent-based Protections en.srt68222023-08-23 17:36:21
-004. 1.3 Comparing Security Deployments Agentless and Agent-based Protections.mp4119857392023-08-23 15:50:59
-005. 1.4 Comparing Security Deployments Legacy Antivirus and Antimalware en.srt65042023-08-23 17:36:21
-005. 1.4 Comparing Security Deployments Legacy Antivirus and Antimalware.mp4111647612023-08-23 15:51:00
-006. 1.5 Comparing Security Deployments SIEM, SOAR, and Log Management en.srt56842023-08-23 17:36:21
-006. 1.5 Comparing Security Deployments SIEM, SOAR, and Log Management.mp4352644272023-08-23 15:51:03
-007. 1.6 Defining Threat Intelligence en.srt68452023-08-23 17:36:22
-007. 1.6 Defining Threat Intelligence.mp4477903402023-08-23 15:51:07
-008. 1.7 Defining Threat Hunting en.srt117972023-08-23 17:36:22
-008. 1.7 Defining Threat Hunting.mp4296357002023-08-23 15:51:10
-009. 1.8 Understanding Malware Analysis en.srt43902023-08-23 17:36:22
-009. 1.8 Understanding Malware Analysis.mp4295190782023-08-23 15:51:12
-010. 1.9 Interpreting the Output Report of a Malware Analysis Tool en.srt16972023-08-23 17:36:23
-010. 1.9 Interpreting the Output Report of a Malware Analysis Tool.mp499495142023-08-23 15:51:14
-011. 1.10 Understanding the Different Threat Actor Types en.srt51662023-08-23 17:36:23
-011. 1.10 Understanding the Different Threat Actor Types.mp459394612023-08-23 15:51:14
-012. 1.11 Defining Run Book Automation (RBA) en.srt30902023-08-23 17:36:23
-012. 1.11 Defining Run Book Automation (RBA).mp489040062023-08-23 15:51:15
-013. 1.12 Defining Reverse Engineering en.srt65662023-08-23 17:36:24
-013. 1.12 Defining Reverse Engineering.mp4100904742023-08-23 15:51:16
-014. 1.13 Understanding the Sliding Window Anomaly Detection en.srt17832023-08-23 17:36:24
-014. 1.13 Understanding the Sliding Window Anomaly Detection.mp450045632023-08-23 15:51:17

control-panel