| parent folder | - | - |
| - | 001. Learning objectives en.srt | 1188 | 2023-08-23 17:36:19 |
| - | 001. Learning objectives.mp4 | 6080052 | 2023-08-23 15:50:55 |
| - | 002. 1.1 Describing the CIA Triad en.srt | 4429 | 2023-08-23 17:36:20 |
| - | 002. 1.1 Describing the CIA Triad.mp4 | 6708211 | 2023-08-23 15:50:56 |
| - | 003. 1.2 Comparing Security Deployments Network, Endpoint, and Application Security Systems en.srt | 1898 | 2023-08-23 17:36:20 |
| - | 003. 1.2 Comparing Security Deployments Network, Endpoint, and Application Security Systems.mp4 | 13013355 | 2023-08-23 15:50:57 |
| - | 004. 1.3 Comparing Security Deployments Agentless and Agent-based Protections en.srt | 6822 | 2023-08-23 17:36:21 |
| - | 004. 1.3 Comparing Security Deployments Agentless and Agent-based Protections.mp4 | 11985739 | 2023-08-23 15:50:59 |
| - | 005. 1.4 Comparing Security Deployments Legacy Antivirus and Antimalware en.srt | 6504 | 2023-08-23 17:36:21 |
| - | 005. 1.4 Comparing Security Deployments Legacy Antivirus and Antimalware.mp4 | 11164761 | 2023-08-23 15:51:00 |
| - | 006. 1.5 Comparing Security Deployments SIEM, SOAR, and Log Management en.srt | 5684 | 2023-08-23 17:36:21 |
| - | 006. 1.5 Comparing Security Deployments SIEM, SOAR, and Log Management.mp4 | 35264427 | 2023-08-23 15:51:03 |
| - | 007. 1.6 Defining Threat Intelligence en.srt | 6845 | 2023-08-23 17:36:22 |
| - | 007. 1.6 Defining Threat Intelligence.mp4 | 47790340 | 2023-08-23 15:51:07 |
| - | 008. 1.7 Defining Threat Hunting en.srt | 11797 | 2023-08-23 17:36:22 |
| - | 008. 1.7 Defining Threat Hunting.mp4 | 29635700 | 2023-08-23 15:51:10 |
| - | 009. 1.8 Understanding Malware Analysis en.srt | 4390 | 2023-08-23 17:36:22 |
| - | 009. 1.8 Understanding Malware Analysis.mp4 | 29519078 | 2023-08-23 15:51:12 |
| - | 010. 1.9 Interpreting the Output Report of a Malware Analysis Tool en.srt | 1697 | 2023-08-23 17:36:23 |
| - | 010. 1.9 Interpreting the Output Report of a Malware Analysis Tool.mp4 | 9949514 | 2023-08-23 15:51:14 |
| - | 011. 1.10 Understanding the Different Threat Actor Types en.srt | 5166 | 2023-08-23 17:36:23 |
| - | 011. 1.10 Understanding the Different Threat Actor Types.mp4 | 5939461 | 2023-08-23 15:51:14 |
| - | 012. 1.11 Defining Run Book Automation (RBA) en.srt | 3090 | 2023-08-23 17:36:23 |
| - | 012. 1.11 Defining Run Book Automation (RBA).mp4 | 8904006 | 2023-08-23 15:51:15 |
| - | 013. 1.12 Defining Reverse Engineering en.srt | 6566 | 2023-08-23 17:36:24 |
| - | 013. 1.12 Defining Reverse Engineering.mp4 | 10090474 | 2023-08-23 15:51:16 |
| - | 014. 1.13 Understanding the Sliding Window Anomaly Detection en.srt | 1783 | 2023-08-23 17:36:24 |
| - | 014. 1.13 Understanding the Sliding Window Anomaly Detection.mp4 | 5004563 | 2023-08-23 15:51:17 |