| - | 001. Learning objectives en.srt | 1036 | | | | | | | | srt | | | srt | 2023-08-23 17:37:01 |
| - | 001. Learning objectives.mp4 | 5443253 | | 54.868776 | 793 | 660 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 15:52:46 |
| - | 002. 6.1 Describing Endpoint-based Attacks en.srt | 15701 | | | | | | | | srt | | | srt | 2023-08-23 17:37:02 |
| - | 002. 6.1 Describing Endpoint-based Attacks.mp4 | 35035265 | | 592.642902 | 472 | 339 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 15:52:49 |
| - | 003. 6.2 Understanding Data Normalization en.srt | 4173 | | | | | | | | srt | | | srt | 2023-08-23 17:37:03 |
| - | 003. 6.2 Understanding Data Normalization.mp4 | 7889486 | | 180.37263 | 349 | 216 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 15:52:50 |
| - | 004. 6.3 Deconstructing Universal Data Formats en.srt | 4397 | | | | | | | | srt | | | srt | 2023-08-23 17:37:04 |
| - | 004. 6.3 Deconstructing Universal Data Formats.mp4 | 10736724 | | 187.733333 | 457 | 324 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 15:52:51 |
| - | 005. 6.4 Understanding the 5-tuple Correlation en.srt | 2830 | | | | | | | | srt | | | srt | 2023-08-23 17:37:05 |
| - | 005. 6.4 Understanding the 5-tuple Correlation.mp4 | 5835744 | | 129.637007 | 360 | 226 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 15:52:52 |
| - | 006. 6.5 Performing DNS Analysis en.srt | 1991 | | | | | | | | srt | | | srt | 2023-08-23 17:37:06 |
| - | 006. 6.5 Performing DNS Analysis.mp4 | 5517085 | | 91.788481 | 480 | 347 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 15:52:52 |
| - | 007. 6.6 Performing Web Log Analysis en.srt | 5525 | | | | | | | | srt | | | srt | 2023-08-23 17:37:07 |
| - | 007. 6.6 Performing Web Log Analysis.mp4 | 16416779 | | 260.202812 | 504 | 371 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 15:52:54 |
| - | 008. 6.7 Performing Deterministic and Probabilistic Analysis en.srt | 2591 | | | | | | | | srt | | | srt | 2023-08-23 17:37:07 |
| - | 008. 6.7 Performing Deterministic and Probabilistic Analysis.mp4 | 6386915 | | 119.327347 | 428 | 294 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 15:52:55 |
| - | 009. 6.8 Understanding Security Monitoring Fundamentals en.srt | 3871 | | | | | | | | srt | | | srt | 2023-08-23 17:37:08 |
| - | 009. 6.8 Understanding Security Monitoring Fundamentals.mp4 | 7817966 | | 161.541224 | 387 | 253 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 15:52:56 |
| - | 010. 6.9 Surveying Security Monitoring Tools en.srt | 4238 | | | | | | | | srt | | | srt | 2023-08-23 17:37:09 |
| - | 010. 6.9 Surveying Security Monitoring Tools.mp4 | 7364668 | | 167.810612 | 351 | 217 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 15:52:57 |
| - | 011. 6.10 Grasping Security Monitoring Operational Challenges en.srt | 21486 | | | | | | | | srt | | | srt | 2023-08-23 17:37:10 |
| - | 011. 6.10 Grasping Security Monitoring Operational Challenges.mp4 | 36758241 | | 808.518821 | 363 | 230 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 15:53:00 |