f69dc311a936 // 3.77 TiB free of 3.98 TiB

c File Name Size Date
parent folder--
-001. Learning objectives en.srt10362023-08-23 17:37:01
-001. Learning objectives.mp454432532023-08-23 15:52:46
-002. 6.1 Describing Endpoint-based Attacks en.srt157012023-08-23 17:37:02
-002. 6.1 Describing Endpoint-based Attacks.mp4350352652023-08-23 15:52:49
-003. 6.2 Understanding Data Normalization en.srt41732023-08-23 17:37:03
-003. 6.2 Understanding Data Normalization.mp478894862023-08-23 15:52:50
-004. 6.3 Deconstructing Universal Data Formats en.srt43972023-08-23 17:37:04
-004. 6.3 Deconstructing Universal Data Formats.mp4107367242023-08-23 15:52:51
-005. 6.4 Understanding the 5-tuple Correlation en.srt28302023-08-23 17:37:05
-005. 6.4 Understanding the 5-tuple Correlation.mp458357442023-08-23 15:52:52
-006. 6.5 Performing DNS Analysis en.srt19912023-08-23 17:37:06
-006. 6.5 Performing DNS Analysis.mp455170852023-08-23 15:52:52
-007. 6.6 Performing Web Log Analysis en.srt55252023-08-23 17:37:07
-007. 6.6 Performing Web Log Analysis.mp4164167792023-08-23 15:52:54
-008. 6.7 Performing Deterministic and Probabilistic Analysis en.srt25912023-08-23 17:37:07
-008. 6.7 Performing Deterministic and Probabilistic Analysis.mp463869152023-08-23 15:52:55
-009. 6.8 Understanding Security Monitoring Fundamentals en.srt38712023-08-23 17:37:08
-009. 6.8 Understanding Security Monitoring Fundamentals.mp478179662023-08-23 15:52:56
-010. 6.9 Surveying Security Monitoring Tools en.srt42382023-08-23 17:37:09
-010. 6.9 Surveying Security Monitoring Tools.mp473646682023-08-23 15:52:57
-011. 6.10 Grasping Security Monitoring Operational Challenges en.srt214862023-08-23 17:37:10
-011. 6.10 Grasping Security Monitoring Operational Challenges.mp4367582412023-08-23 15:53:00

control-panel