SANS 450 - Blue team fundamentals
File List
- 2020/Sec450 Virtual Machine/Sec450 Virtual Machine.iso 15.9 GB
- 2022/ISO/450.22.1.iso 14.3 GB
- 2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_21_2.webm 62.0 MB
- 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_22.webm 61.8 MB
- 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_29.webm 61.1 MB
- 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_31.webm 59.3 MB
- 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_21_2.webm 50.6 MB
- 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_26.webm 41.3 MB
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/pack/pack-8738db4f374c1f90340e72cd7592dc8a00d61e7d.pack 40.5 MB
- 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand.webm 40.0 MB
- 2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_15_2.webm 37.7 MB
- 2020/Sec450 Video/Section 2/2.9 DAY 2 SUMMARY/SEC450- SANS OnDemand_4_2.webm 33.4 MB
- 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_28.webm 33.0 MB
- 2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_9.webm 31.1 MB
- 2020/Sec450 PDF/SEC450 - Workbook.pdf 28.7 MB
- 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_31_2.webm 26.9 MB
- 2020/Sec450 Video/Section 1/1.9 DAY 1 SUMMARY/SEC450- SANS OnDemand_5.webm 25.1 MB
- 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_19_2.webm 24.0 MB
- 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_20.webm 23.8 MB
- 2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_17.webm 20.7 MB
- 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_21.webm 18.5 MB
- 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_20.webm 18.2 MB
- 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_11.webm 18.0 MB
- 2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_17_2.webm 17.7 MB
- 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_2.webm 17.6 MB
- 2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand_3.webm 16.4 MB
- 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_23.webm 15.6 MB
- 2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand_7.webm 15.0 MB
- 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_11.webm 14.7 MB
- 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_20_2.webm 14.4 MB
- 2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_5.webm 14.3 MB
- 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_8.webm 14.1 MB
- 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_16_2.webm 14.0 MB
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/pack/pack-a5835f7443762e31a13a10fffe23d05818565349.pack 13.9 MB
- 2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_4_2.webm 13.9 MB
- 2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_7_2.webm 13.5 MB
- 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_13.webm 13.1 MB
- 2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_15_2.webm 13.1 MB
- 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_5_2.webm 12.9 MB
- 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_14.webm 12.8 MB
- 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_23.webm 12.7 MB
- 2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_12_2.webm 12.6 MB
- 2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_13.webm 12.6 MB
- 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_7.webm 12.5 MB
- 2022/PDF/SEC450 (2022)/SEC450 - Book 2 (2022).pdf 12.4 MB
- 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_25.webm 12.2 MB
- 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_19.webm 12.1 MB
- 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_19.webm 11.7 MB
- 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_7.webm 11.6 MB
- 2020/Sec450 PDF/SEC450 - Book 2.pdf 11.6 MB
- 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_18.webm 11.6 MB
- 2022/PDF/SEC450 (2022)/SEC450 - Book 3 (2022).pdf 11.2 MB
- 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_2.webm 11.0 MB
- 2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_10.webm 11.0 MB
- 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_20.webm 10.8 MB
- 2020/Sec450 Video/Section 3/3.9 DAY 3 SUMMARY/SEC450- SANS OnDemand_3.webm 10.8 MB
- 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_12.webm 10.8 MB
- 2022/PDF/SEC450 (2022)/SEC450 - Book 5 (2022).pdf 10.7 MB
- 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_10.webm 10.7 MB
- 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_12_2.webm 10.5 MB
- 2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_13_2.webm 10.5 MB
- 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_10.webm 10.5 MB
- 2020/Sec450 PDF/SEC450 - Book 5.pdf 10.4 MB
- 2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_6.webm 10.4 MB
- 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_17_2.webm 10.3 MB
- 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_22_2.webm 10.3 MB
- 2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_13_2.webm 10.1 MB
- 2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_5_2.webm 10.1 MB
- 2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_11.webm 10.0 MB
- 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_13.webm 10.0 MB
- 2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_15.webm 10.0 MB
- 2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_11_2.webm 9.9 MB
- 2022/PDF/SEC450 (2022)/SEC450 - Book 1 (2022).pdf 9.8 MB
- 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_20.webm 9.8 MB
- 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_8.webm 9.7 MB
- 2020/Sec450 PDF/SEC450 - Book 3.pdf 9.7 MB
- 2020/Sec450 PDF/SEC450 - Book 1.pdf 9.7 MB
- 2022/PDF/SEC450 (2022)/SEC450 - Book 4 (2022).pdf 9.7 MB
- 2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_7_2.webm 9.7 MB
- 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_29.webm 9.6 MB
- 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_8_2.webm 9.6 MB
- 2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_2.webm 9.5 MB
- 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_13.webm 9.5 MB
- 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_17.webm 9.4 MB
- 2020/Sec450 PDF/SEC450 - Book 4.pdf 9.4 MB
- 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_13.webm 9.3 MB
- 2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_12.webm 9.3 MB
- 2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_15_2.webm 9.2 MB
- 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_20.webm 9.1 MB
- 2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_6_2.webm 9.0 MB
- 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_10.webm 8.9 MB
- 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_26.webm 8.9 MB
- 2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_11_2.webm 8.8 MB
- 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_18.webm 8.7 MB
- 2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_9_2.webm 8.7 MB
- 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_21.webm 8.7 MB
- 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_6.webm 8.7 MB
- 2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_8_2.webm 8.6 MB
- 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_14.webm 8.5 MB
- 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_21.webm 8.4 MB
- 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_31.webm 8.4 MB
- 2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_7_2.webm 8.4 MB
- 2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_9.webm 8.4 MB
- 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_14_3.webm 8.3 MB
- 2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_10.webm 8.2 MB
- 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_17.webm 8.1 MB
- 2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_9_2.webm 8.0 MB
- 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_19_2.webm 8.0 MB
- 2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_4.webm 7.9 MB
- 2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_8.webm 7.9 MB
- 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_21_2.webm 7.9 MB
- 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_19.webm 7.9 MB
- 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_24.webm 7.9 MB
- 2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_6.webm 7.8 MB
- 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_18.webm 7.8 MB
- 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_21_2.webm 7.8 MB
- 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_15_2.webm 7.8 MB
- 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_21.webm 7.7 MB
- 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_17_2.webm 7.7 MB
- 2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_18_2.webm 7.6 MB
- 2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_14_2.webm 7.5 MB
- 2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_16_2.webm 7.4 MB
- 2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_14_2.webm 7.3 MB
- 2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_13_2.webm 7.3 MB
- 2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_15.webm 7.3 MB
- 2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_2_2.webm 7.2 MB
- 2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_3_2.webm 7.2 MB
- 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_26.webm 7.2 MB
- 2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_4.webm 7.2 MB
- 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_22.webm 7.2 MB
- 2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_17.webm 7.1 MB
- 2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_8_2.webm 7.1 MB
- 2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_14_2.webm 7.1 MB
- 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_12.webm 7.1 MB
- 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_18_2.webm 7.0 MB
- 2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_6_2.webm 7.0 MB
- 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_25.webm 7.0 MB
- 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_20_2.webm 6.9 MB
- 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_22.webm 6.8 MB
- 2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand_10.webm 6.8 MB
- 2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_6_2.webm 6.8 MB
- 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_16_2.webm 6.8 MB
- 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_6.webm 6.8 MB
- 2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_7_2.webm 6.7 MB
- 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_28.webm 6.7 MB
- 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_18.webm 6.6 MB
- 2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_20.webm 6.6 MB
- 2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_5_2.webm 6.6 MB
- 2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_8_2.webm 6.5 MB
- 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_15.webm 6.5 MB
- 2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_11_2.webm 6.4 MB
- 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_11.webm 6.4 MB
- 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_22.webm 6.4 MB
- 2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_12.webm 6.4 MB
- 2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_11.webm 6.4 MB
- 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_19.webm 6.4 MB
- 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_13_3.webm 6.4 MB
- 2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_8_2.webm 6.4 MB
- 2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_6.webm 6.4 MB
- 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_5.webm 6.3 MB
- 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_4.webm 6.3 MB
- 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_22.webm 6.3 MB
- 2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_14.webm 6.2 MB
- 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_10.webm 6.2 MB
- 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_11.webm 6.1 MB
- 2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_6.webm 6.1 MB
- 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_27.webm 6.1 MB
- 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_12_2.webm 6.1 MB
- 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_10_2.webm 6.1 MB
- 2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_8.webm 6.0 MB
- 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_12.webm 6.0 MB
- 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_9_2.webm 6.0 MB
- 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_18.webm 6.0 MB
- 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_20_2.webm 5.9 MB
- 2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_8_2.webm 5.9 MB
- 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_11_2.webm 5.8 MB
- 2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_6_2.webm 5.8 MB
- 2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_12.webm 5.8 MB
- 2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_5.webm 5.8 MB
- 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_24.webm 5.8 MB
- 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_14.webm 5.7 MB
- 2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_4.webm 5.7 MB
- 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_16.webm 5.7 MB
- 2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand.webm 5.7 MB
- 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_5.webm 5.7 MB
- 2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_2.webm 5.6 MB
- 2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_15_2.webm 5.6 MB
- 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_14.webm 5.6 MB
- 2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_10_2.webm 5.6 MB
- 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_14_2.webm 5.5 MB
- 2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_17.webm 5.5 MB
- 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_8.webm 5.5 MB
- 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_12_2.webm 5.4 MB
- 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_14.webm 5.4 MB
- 2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_2_2.webm 5.4 MB
- 2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_11.webm 5.4 MB
- 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_7_2.webm 5.3 MB
- 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_13_2.webm 5.3 MB
- 2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_11.webm 5.3 MB
- 2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_15.webm 5.3 MB
- 2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_10.webm 5.3 MB
- 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_11.webm 5.3 MB
- 2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_14_2.webm 5.2 MB
- 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_23.webm 5.2 MB
- 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_18.webm 5.2 MB
- 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_8.webm 5.2 MB
- 2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_3.webm 5.2 MB
- 2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_20.webm 5.2 MB
- 2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_17_2.webm 5.1 MB
- 2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_3.webm 5.1 MB
- 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_12.webm 5.1 MB
- 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_13_2.webm 5.1 MB
- 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_9_2.webm 5.1 MB
- 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_23_2.webm 5.0 MB
- 2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_11.webm 5.0 MB
- 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_10_2.webm 5.0 MB
- 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_19_2.webm 5.0 MB
- 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_28.webm 4.9 MB
- 2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_17.webm 4.9 MB
- 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_10_2.webm 4.9 MB
- 2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_10.webm 4.9 MB
- 2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_21.webm 4.9 MB
- 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_20.webm 4.9 MB
- 2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_10_2.webm 4.8 MB
- 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_4_2.webm 4.8 MB
- 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_18_2.webm 4.8 MB
- 2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_12.webm 4.8 MB
- 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_19.webm 4.8 MB
- 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_14_2.webm 4.7 MB
- 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_18.webm 4.7 MB
- 2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_9.webm 4.7 MB
- 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_11_2.webm 4.7 MB
- 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_4.webm 4.7 MB
- 2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_7.webm 4.7 MB
- 2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_3_2.webm 4.7 MB
- 2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_7.webm 4.6 MB
- 2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_19.webm 4.6 MB
- 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_20.webm 4.6 MB
- 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_17_2.webm 4.6 MB
- 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_24.webm 4.6 MB
- 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_6.webm 4.5 MB
- 2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_15.webm 4.5 MB
- 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_14_2.webm 4.5 MB
- 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_12.webm 4.5 MB
- 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_2.webm 4.5 MB
- 2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_3.webm 4.5 MB
- 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_8.webm 4.5 MB
- 2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_2.webm 4.4 MB
- 2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_4_2.webm 4.4 MB
- 2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_10_2.webm 4.4 MB
- 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_24_2.webm 4.4 MB
- 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_3.webm 4.4 MB
- 2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_11_2.webm 4.4 MB
- 2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_8.webm 4.4 MB
- 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_24.webm 4.4 MB
- 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_20_2.webm 4.4 MB
- 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_17_2.webm 4.3 MB
- 2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_9.webm 4.3 MB
- 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_17_2.webm 4.3 MB
- 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_5_2.webm 4.3 MB
- 2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_18_2.webm 4.3 MB
- 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_13.webm 4.3 MB
- 2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_7.webm 4.3 MB
- 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_7.webm 4.2 MB
- 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_22.webm 4.2 MB
- 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_28.webm 4.2 MB
- 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_7_2.webm 4.2 MB
- 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_17.webm 4.2 MB
- 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_11.webm 4.2 MB
- 2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand_5.webm 4.2 MB
- 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_12_2.webm 4.2 MB
- 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_3_2.webm 4.2 MB
- 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_12_2.webm 4.2 MB
- 2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_5.webm 4.1 MB
- 2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_11_2.webm 4.1 MB
- 2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_19.webm 4.1 MB
- 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_17_2.webm 4.1 MB
- 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_32.webm 4.1 MB
- 2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_15.webm 4.1 MB
- 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_17.webm 4.0 MB
- 2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_16_2.webm 4.0 MB
- 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_15.webm 4.0 MB
- 2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_4_2.webm 4.0 MB
- 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_23.webm 4.0 MB
- 2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_13.webm 4.0 MB
- 2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_13_3.webm 4.0 MB
- 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_21.webm 4.0 MB
- 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_22.webm 4.0 MB
- 2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_4_2.webm 4.0 MB
- 2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_9.webm 4.0 MB
- 2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_14.webm 3.9 MB
- 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_21.webm 3.9 MB
- 2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_13.webm 3.9 MB
- 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_11_2.webm 3.9 MB
- 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_8.webm 3.9 MB
- 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_10.webm 3.9 MB
- 2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_4_3.webm 3.9 MB
- 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_15.webm 3.9 MB
- 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_20_2.webm 3.8 MB
- 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_22_2.webm 3.8 MB
- 2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_12_2.webm 3.8 MB
- 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_6.webm 3.8 MB
- 2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_16.webm 3.8 MB
- 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_4_2.webm 3.8 MB
- 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_2_2.webm 3.8 MB
- 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_15.webm 3.8 MB
- 2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_3_2.webm 3.8 MB
- 2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_6.webm 3.8 MB
- 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_4.webm 3.8 MB
- 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_4_2.webm 3.8 MB
- 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_21.webm 3.7 MB
- 2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_4.webm 3.7 MB
- 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_23.webm 3.7 MB
- 2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand_4.webm 3.7 MB
- 2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_14_2.webm 3.7 MB
- 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_8_2.webm 3.7 MB
- 2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_16_2.webm 3.7 MB
- 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_21_2.webm 3.7 MB
- 2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_10.webm 3.7 MB
- 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_12.webm 3.7 MB
- 2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_9_2.webm 3.6 MB
- 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_8_2.webm 3.6 MB
- 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_21_2.webm 3.6 MB
- 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_26.webm 3.6 MB
- 2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand_9.webm 3.6 MB
- 2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_9_2.webm 3.6 MB
- 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_25.webm 3.6 MB
- 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_17.webm 3.6 MB
- 2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_18.webm 3.6 MB
- 2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_14.webm 3.6 MB
- 2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_4.webm 3.6 MB
- 2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_9.webm 3.6 MB
- 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_24.webm 3.6 MB
- 2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_10_2.webm 3.5 MB
- 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_6.webm 3.5 MB
- 2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_8_2.webm 3.5 MB
- 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_9.webm 3.5 MB
- 2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_7.webm 3.5 MB
- 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_27.webm 3.5 MB
- 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_10.webm 3.5 MB
- 2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_7_2.webm 3.5 MB
- 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_6.webm 3.5 MB
- 2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_3_2.webm 3.5 MB
- 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_16.webm 3.5 MB
- 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_7.webm 3.4 MB
- 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_21.webm 3.4 MB
- 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_4_2.webm 3.4 MB
- 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_11.webm 3.4 MB
- 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_13.webm 3.4 MB
- 2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_18.webm 3.4 MB
- 2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_19_2.webm 3.4 MB
- 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_4.webm 3.4 MB
- 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_15.webm 3.4 MB
- 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_23.webm 3.4 MB
- 2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_3.webm 3.4 MB
- 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_9_2.webm 3.3 MB
- 2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_10_2.webm 3.3 MB
- 2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_4.webm 3.3 MB
- 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_8_2.webm 3.3 MB
- 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_7_2.webm 3.3 MB
- 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_14.webm 3.3 MB
- 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_14_2.webm 3.3 MB
- 2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_7_2.webm 3.3 MB
- 2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_14_2.webm 3.3 MB
- 2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_10_2.webm 3.3 MB
- 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_11_2.webm 3.3 MB
- 2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_12_2.webm 3.3 MB
- 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_25_2.webm 3.3 MB
- 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_15.webm 3.3 MB
- 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_24_2.webm 3.2 MB
- 2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_9_2.webm 3.2 MB
- 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_31.webm 3.2 MB
- 2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_18_2.webm 3.2 MB
- 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_8.webm 3.2 MB
- 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_18.webm 3.2 MB
- 2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_16_2.webm 3.2 MB
- 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_28_2.webm 3.2 MB
- 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_18.webm 3.2 MB
- 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_8.webm 3.1 MB
- 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_10_2.webm 3.1 MB
- 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_4_2.webm 3.1 MB
- 2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_8_2.webm 3.1 MB
- 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_9_2.webm 3.1 MB
- 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_5_2.webm 3.1 MB
- 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_5.webm 3.1 MB
- 2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_17_2.webm 3.1 MB
- 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_26.webm 3.1 MB
- 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_23.webm 3.1 MB
- 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_19_2.webm 3.1 MB
- 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_30.webm 3.0 MB
- 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_18_2.webm 3.0 MB
- 2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_10.webm 3.0 MB
- 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_24.webm 3.0 MB
- 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_16_2.webm 3.0 MB
- 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_7_2.webm 3.0 MB
- 2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_5.webm 3.0 MB
- 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_19.webm 3.0 MB
- 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_13.webm 3.0 MB
- 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_7_2.webm 3.0 MB
- 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_16.webm 3.0 MB
- 2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand_11.webm 3.0 MB
- 2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_9_2.webm 3.0 MB
- 2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_15_2.webm 3.0 MB
- 2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_5_2.webm 3.0 MB
- 2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_13_2.webm 3.0 MB
- 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_15.webm 3.0 MB
- 2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_12_2.webm 3.0 MB
- 2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_11_2.webm 2.9 MB
- 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_17.webm 2.9 MB
- 2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_5_2.webm 2.9 MB
- 2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_4_2.webm 2.9 MB
- 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_4.webm 2.9 MB
- 2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_18_2.webm 2.9 MB
- 2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_6_2.webm 2.9 MB
- 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_6_2.webm 2.9 MB
- 2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_2_2.webm 2.9 MB
- 2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_17.webm 2.9 MB
- 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_20.webm 2.9 MB
- 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_11_2.webm 2.9 MB
- 2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_15_2.webm 2.9 MB
- 2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_10.webm 2.9 MB
- 2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_8.webm 2.9 MB
- 2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_5_2.webm 2.9 MB
- 2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_12_2.webm 2.9 MB
- 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_14.webm 2.9 MB
- 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_6_2.webm 2.9 MB
- 2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_9_2.webm 2.9 MB
- 2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_7.webm 2.9 MB
- 2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_16.webm 2.9 MB
- 2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_10_2.webm 2.9 MB
- 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_14.webm 2.9 MB
- 2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_5_2.webm 2.9 MB
- 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_19.webm 2.9 MB
- 2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_4_2.webm 2.8 MB
- 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_14.webm 2.8 MB
- 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_20.webm 2.8 MB
- 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_25.webm 2.8 MB
- 2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_11_2.webm 2.8 MB
- 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_25.webm 2.8 MB
- 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_22.webm 2.8 MB
- 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_5_2.webm 2.8 MB
- 2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_20_2.webm 2.8 MB
- 2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_16.webm 2.8 MB
- 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_15_2.webm 2.8 MB
- 2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_6.webm 2.7 MB
- 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_5_2.webm 2.7 MB
- 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_18_2.webm 2.7 MB
- 2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_14.webm 2.7 MB
- 2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_20_2.webm 2.7 MB
- 2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_14.webm 2.7 MB
- 2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_10_2.webm 2.7 MB
- 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_9.webm 2.7 MB
- 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_14_2.webm 2.7 MB
- 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_29.webm 2.7 MB
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/pack/pack-03bdfb6e4174a4f0d659f690a6368cd0960936e3.pack 2.7 MB
- 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_9.webm 2.7 MB
- 2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_4_2.webm 2.7 MB
- 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_3_2.webm 2.7 MB
- 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_3.webm 2.7 MB
- 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_3.webm 2.7 MB
- 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_7.webm 2.7 MB
- 2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_13_2.webm 2.7 MB
- 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_10.webm 2.7 MB
- 2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_15_2.webm 2.7 MB
- 2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_5.webm 2.6 MB
- 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_4.webm 2.6 MB
- 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_6_2.webm 2.6 MB
- 2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_18.webm 2.6 MB
- 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_23.webm 2.6 MB
- 2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_19.webm 2.6 MB
- 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_3_2.webm 2.6 MB
- 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_14.webm 2.6 MB
- 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_3_2.webm 2.6 MB
- 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_4.webm 2.6 MB
- 2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_6_2.webm 2.6 MB
- 2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_3_2.webm 2.6 MB
- 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_23.webm 2.6 MB
- 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_5.webm 2.6 MB
- 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_12.webm 2.6 MB
- 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_3_2.webm 2.6 MB
- 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_27.webm 2.6 MB
- 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_27.webm 2.6 MB
- 2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_6.webm 2.6 MB
- 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_22_2.webm 2.6 MB
- 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_10.webm 2.6 MB
- 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_17.webm 2.6 MB
- 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_10_2.webm 2.6 MB
- 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_15_2.webm 2.6 MB
- 2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_11_2.webm 2.5 MB
- 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_30.webm 2.5 MB
- 2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_7.webm 2.5 MB
- 2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_2_2.webm 2.5 MB
- 2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_16_2.webm 2.5 MB
- 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_7_2.webm 2.5 MB
- 2020/Sec450 Video/Section 1/1.9 DAY 1 SUMMARY/SEC450- SANS OnDemand_2.webm 2.5 MB
- 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_10.webm 2.5 MB
- 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_5_2.webm 2.5 MB
- 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_2_2.webm 2.5 MB
- 2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_13.webm 2.5 MB
- 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_16.webm 2.4 MB
- 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_17.webm 2.4 MB
- 2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_7_2.webm 2.4 MB
- 2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_2_2.webm 2.4 MB
- 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_9.webm 2.4 MB
- 2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_2.webm 2.4 MB
- 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_13_2.webm 2.3 MB
- 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_23.webm 2.3 MB
- 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_15.webm 2.3 MB
- 2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_7.webm 2.3 MB
- 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_8_2.webm 2.3 MB
- 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_15_2.webm 2.3 MB
- 2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_12_2.webm 2.3 MB
- 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_16.webm 2.3 MB
- 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_4_3.webm 2.3 MB
- 2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_19.webm 2.3 MB
- 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_3_2.webm 2.3 MB
- 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_10_2.webm 2.3 MB
- 2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_13.webm 2.3 MB
- 2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_12.webm 2.3 MB
- 2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_7_2.webm 2.3 MB
- 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_15.webm 2.3 MB
- 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_5_2.webm 2.3 MB
- 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_24.webm 2.3 MB
- 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_16_2.webm 2.3 MB
- 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_26_2.webm 2.3 MB
- 2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_9_2.webm 2.3 MB
- 2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_5.webm 2.3 MB
- 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_11.webm 2.3 MB
- 2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_2_2.webm 2.2 MB
- 2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_4_2.webm 2.2 MB
- 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_12.webm 2.2 MB
- 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_29.webm 2.2 MB
- 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_7.webm 2.2 MB
- 2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_12.webm 2.2 MB
- 2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_10_2.webm 2.2 MB
- 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_18_2.webm 2.2 MB
- 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_3.webm 2.2 MB
- 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_18_2.webm 2.2 MB
- 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_19.webm 2.2 MB
- 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_19_2.webm 2.2 MB
- 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_3.webm 2.1 MB
- 2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_6_2.webm 2.1 MB
- 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_11.webm 2.1 MB
- 2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_3.webm 2.1 MB
- 2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_13_2.webm 2.1 MB
- 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_17.webm 2.1 MB
- 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_16.webm 2.1 MB
- 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_16.webm 2.1 MB
- 2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_13.webm 2.1 MB
- 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_10.webm 2.1 MB
- 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_3.webm 2.1 MB
- 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_5.webm 2.1 MB
- 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_3_2.webm 2.0 MB
- 2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_8_2.webm 2.0 MB
- 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_16.webm 2.0 MB
- 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_19.webm 2.0 MB
- 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_22.webm 2.0 MB
- 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_2_2.webm 2.0 MB
- 2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_13_2.webm 2.0 MB
- 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_16_2.webm 2.0 MB
- 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_11_2.webm 2.0 MB
- 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_22.webm 2.0 MB
- 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_8.webm 2.0 MB
- 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_6.webm 2.0 MB
- 2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_21_2.webm 2.0 MB
- 2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_13_2.webm 2.0 MB
- 2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_10.webm 2.0 MB
- 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_9.webm 2.0 MB
- 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_9.webm 2.0 MB
- 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_6.webm 1.9 MB
- 2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_12_2.webm 1.9 MB
- 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_17_2.webm 1.9 MB
- 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_5.webm 1.9 MB
- 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_26_3.webm 1.9 MB
- 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_7.webm 1.9 MB
- 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_16.webm 1.9 MB
- 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_28.webm 1.9 MB
- 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_14.webm 1.9 MB
- 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_21.webm 1.9 MB
- 2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_2.webm 1.9 MB
- 2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_3_2.webm 1.9 MB
- 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_20_2.webm 1.9 MB
- 2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_14_2.webm 1.9 MB
- 2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand_12.webm 1.9 MB
- 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_15.webm 1.9 MB
- 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_3_2.webm 1.9 MB
- 2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_6_2.webm 1.9 MB
- 2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_5_2.webm 1.9 MB
- 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_10_2.webm 1.9 MB
- 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_16_2.webm 1.8 MB
- 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_15.webm 1.8 MB
- 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_17.webm 1.8 MB
- 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_20.webm 1.8 MB
- 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_2.webm 1.8 MB
- 2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_3_2.webm 1.8 MB
- 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_24_2.webm 1.8 MB
- 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_6.webm 1.8 MB
- 2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_5_2.webm 1.8 MB
- 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_9.webm 1.8 MB
- 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_8.webm 1.8 MB
- 2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_7_2.webm 1.8 MB
- 2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_14_2.webm 1.8 MB
- 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_11_2.webm 1.8 MB
- 2020/Sec450 Video/Section 3/3.9 DAY 3 SUMMARY/SEC450- SANS OnDemand_2.webm 1.7 MB
- 2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_11_2.webm 1.7 MB
- 2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_7.webm 1.7 MB
- 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_2.webm 1.7 MB
- 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_13_2.webm 1.7 MB
- 2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_13.webm 1.7 MB
- 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_23_2.webm 1.7 MB
- 2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_5.webm 1.7 MB
- 2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_20_2.webm 1.7 MB
- 2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_12.webm 1.7 MB
- 2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_2_2.webm 1.7 MB
- 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_22_2.webm 1.7 MB
- 2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_9.webm 1.7 MB
- 2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand_2.webm 1.7 MB
- 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_26.webm 1.7 MB
- 2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_4_2.webm 1.7 MB
- 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_12_2.webm 1.7 MB
- 2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_4_3.webm 1.7 MB
- 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_14_2.webm 1.7 MB
- 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_22.webm 1.7 MB
- 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_17_2.webm 1.7 MB
- 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_11.webm 1.7 MB
- 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_9_2.webm 1.7 MB
- 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_13_2.webm 1.7 MB
- 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_4_2.webm 1.6 MB
- 2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand_8.webm 1.6 MB
- 2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_15.webm 1.6 MB
- 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_8_2.webm 1.6 MB
- 2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_6_2.webm 1.6 MB
- 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand.webm 1.6 MB
- 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_18.webm 1.6 MB
- 2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_12_2.webm 1.6 MB
- 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_2.webm 1.6 MB
- 2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_11.webm 1.6 MB
- 2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_12_2.webm 1.6 MB
- 2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_13.webm 1.6 MB
- 2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_8.webm 1.6 MB
- 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_2_2.webm 1.6 MB
- 2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_3_2.webm 1.5 MB
- 2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_8.webm 1.5 MB
- 2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_9.webm 1.5 MB
- 2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_6.webm 1.5 MB
- 2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_10_2.webm 1.5 MB
- 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_25.webm 1.5 MB
- 2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_30.webm 1.5 MB
- 2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_2.webm 1.5 MB
- 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_2_2.webm 1.5 MB
- 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_7.webm 1.5 MB
- 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_24.webm 1.5 MB
- 2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_12.webm 1.5 MB
- 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_6_2.webm 1.5 MB
- 2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_2_2.webm 1.5 MB
- 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_22_2.webm 1.5 MB
- 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_6.webm 1.5 MB
- 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_3.webm 1.4 MB
- 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_22_2.webm 1.4 MB
- 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_16.webm 1.4 MB
- 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_2_2.webm 1.4 MB
- 2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_17.webm 1.4 MB
- 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_12_2.webm 1.4 MB
- 2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_14.webm 1.4 MB
- 2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_11.webm 1.4 MB
- 2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_2_2.webm 1.4 MB
- 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_18.webm 1.4 MB
- 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_21_2.webm 1.4 MB
- 2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_6_2.webm 1.4 MB
- 2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_19_2.webm 1.4 MB
- 2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_12.webm 1.4 MB
- 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_9_2 (1).webm 1.4 MB
- 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_9_2.webm 1.4 MB
- 2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_15_2.webm 1.4 MB
- 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_27.webm 1.4 MB
- 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_13.webm 1.4 MB
- 2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_3_2.webm 1.4 MB
- 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_6_2.webm 1.4 MB
- 2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_8_2.webm 1.4 MB
- 2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_8_2.webm 1.4 MB
- 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_11.webm 1.4 MB
- 2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_15.webm 1.4 MB
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/pack/pack-90b4589ad74a56edf25af390111108b7a85dc922.pack 1.4 MB
- 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_12.webm 1.3 MB
- 2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_11_2.webm 1.3 MB
- 2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_2.webm 1.3 MB
- 2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_18.webm 1.3 MB
- 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_4_2.webm 1.3 MB
- 2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_19_2.webm 1.3 MB
- 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_12.webm 1.3 MB
- 2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_4_2.webm 1.3 MB
- 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_29_2.webm 1.3 MB
- 2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_5_2.webm 1.3 MB
- 2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_8_2.webm 1.3 MB
- 2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_17.webm 1.3 MB
- 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_2.webm 1.3 MB
- 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_15_2.webm 1.3 MB
- 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_7_2.webm 1.3 MB
- 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_22.webm 1.3 MB
- 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_9.webm 1.3 MB
- 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_6_2.webm 1.3 MB
- 2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_11_2.webm 1.3 MB
- 2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_2_2.webm 1.2 MB
- 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand.webm 1.2 MB
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/pack/pack-1f71ccc745b2d328a7b9e0611be72e6f5869c7b5.pack 1.2 MB
- 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_2_2.webm 1.2 MB
- 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_9.webm 1.2 MB
- 2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_2_2.webm 1.2 MB
- 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_15_2.webm 1.2 MB
- 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_2.webm 1.2 MB
- 2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_19_2.webm 1.2 MB
- 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_16_2.webm 1.2 MB
- 2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand_3.webm 1.2 MB
- 2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_19.webm 1.2 MB
- 2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_13_2.webm 1.2 MB
- 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_6.webm 1.2 MB
- 2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_17_2.webm 1.2 MB
- 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_4_2.webm 1.2 MB
- 2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_12_2.webm 1.2 MB
- 2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_16.webm 1.2 MB
- 2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_2.webm 1.2 MB
- 2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_2_2.webm 1.2 MB
- 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_12.webm 1.2 MB
- 2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_9_2.webm 1.1 MB
- 2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_5_2.webm 1.1 MB
- 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_26.webm 1.1 MB
- 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_25_2.webm 1.1 MB
- 2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_8.webm 1.1 MB
- 2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_11.webm 1.1 MB
- 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_19.webm 1.1 MB
- 2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_16.webm 1.1 MB
- 2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_6_2.webm 1.1 MB
- 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_23_2.webm 1.1 MB
- 2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_5_2.webm 1.1 MB
- 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_19_2.webm 1.1 MB
- 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_7.webm 1.1 MB
- 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_10.webm 1.1 MB
- 2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_4_2.webm 1.1 MB
- 2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_21.webm 1.0 MB
- 2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_17_2.webm 1.0 MB
- 2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_3_2.webm 1.0 MB
- 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_24.webm 1.0 MB
- 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_5.webm 1.0 MB
- 2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand.webm 1.0 MB
- 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_13_2.webm 1016.7 KB
- 2020/Sec450 Video/Section 2/2.9 DAY 2 SUMMARY/SEC450- SANS OnDemand_2_2.webm 1011.3 KB
- 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_2_2.webm 998.5 KB
- 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_32.webm 996.1 KB
- 2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_30.webm 983.3 KB
- 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_23.webm 981.8 KB
- 2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_12_2.webm 974.6 KB
- 2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand_6.webm 974.0 KB
- 2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/SEC450- SANS OnDemand_20.webm 972.2 KB
- 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_9.webm 968.8 KB
- 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_6_2.webm 965.2 KB
- 2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_10_2.webm 951.3 KB
- 2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_18.webm 950.5 KB
- 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_5.webm 939.6 KB
- 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_5.webm 937.9 KB
- 2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_4.webm 935.1 KB
- 2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_3.webm 925.6 KB
- 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand_9.webm 924.0 KB
- 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_3.webm 897.5 KB
- 2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_16.webm 895.5 KB
- 2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_7_2.webm 882.9 KB
- 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_15_2.webm 878.9 KB
- 2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_13_2.webm 870.4 KB
- 2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_14.webm 868.3 KB
- 2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_6_2.webm 866.7 KB
- 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_20.webm 863.3 KB
- 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand.webm 862.1 KB
- 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_28.webm 843.7 KB
- 2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_7.webm 839.1 KB
- 2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_16.webm 837.3 KB
- 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_13_2.webm 832.1 KB
- 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_27_2.webm 828.1 KB
- 2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_8.webm 825.3 KB
- 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_9_2.webm 822.1 KB
- 2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_19.webm 819.3 KB
- 2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_9_2.webm 808.4 KB
- 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_7.webm 803.9 KB
- 2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/SEC450- SANS OnDemand_13_2.webm 800.3 KB
- 2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_14_2.webm 764.3 KB
- 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand_19_2.webm 756.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/search/search_index.json 739.4 KB
- 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_19.webm 736.6 KB
- 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_8.webm 733.2 KB
- 2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/SEC450- SANS OnDemand_29.webm 721.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/vt-capable.png 721.2 KB
- 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_7.webm 704.3 KB
- 2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand_11.webm 674.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image02.png 671.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/wordcut.js 661.6 KB
- 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_13.webm 658.3 KB
- 2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_7_2.webm 657.7 KB
- 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_2.webm 639.7 KB
- 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_3.webm 616.9 KB
- 2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_9_2.webm 590.8 KB
- 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand.webm 565.1 KB
- 2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/SEC450- SANS OnDemand_14.webm 544.0 KB
- 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_24.webm 542.3 KB
- 2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_9.webm 539.0 KB
- 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_16.webm 523.3 KB
- 2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand.webm 517.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/bundle.c44cc438.min.js.map 514.9 KB
- 2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand_3.webm 507.7 KB
- 2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/SEC450- SANS OnDemand_4.webm 449.4 KB
- 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/SEC450- SANS OnDemand_32.webm 447.3 KB
- 2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/SEC450- SANS OnDemand.webm 438.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image10.png 424.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image05.png 407.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/rubeusinput.png 402.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path3/covenant/s4u.png 399.1 KB
- 2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_6.webm 378.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/copied-it.png 364.8 KB
- 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_8_2.webm 362.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor4/covenant/whiskersuccess.png 357.5 KB
- 2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_8.webm 332.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/formatting.png 323.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image09.png 315.3 KB
- 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_21.webm 314.3 KB
- 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/SEC450- SANS OnDemand_29.webm 308.6 KB
- 2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/SEC450- SANS OnDemand_10.webm 306.7 KB
- 2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/SEC450- SANS OnDemand.webm 305.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image06.png 298.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/resources/img/virtual-machine-credentials/virtual-machine-information-panel-fusion.png 298.1 KB
- 2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/SEC450- SANS OnDemand_16.webm 294.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/empire/certpem.png 294.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image10.png 291.5 KB
- 2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand_15.webm 290.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/covenant/ticket.png 289.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/gui-replication.png 287.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/fgpwpol-adexplorer.png 281.9 KB
- 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_13.webm 278.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/covenant/rubeus.png 276.8 KB
- 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand.webm 270.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/LAPS-ADExplorer.png 269.9 KB
- 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand.webm 267.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/webpage.png 263.0 KB
- 2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_4_2.webm 260.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image09.png 260.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/image03.png 259.5 KB
- 2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_17.webm 256.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor4/covenant/ntlm.png 256.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image04.png 255.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adexplorer-gmsa.png 253.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image15.png 249.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adexplorer-pwpol.png 249.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/asktgt2.png 247.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/image05.png 237.1 KB
- 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/SEC450- SANS OnDemand.webm 231.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image08.png 228.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/snmp.png 228.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adexplorer-computeraccounts.png 225.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image07.png 225.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image12.png 224.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image08.png 223.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/image08.png 222.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor1/empire/kerberoast-ticket.png 221.7 KB
- 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_4.webm 220.7 KB
- 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_25.webm 219.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adexplorerusers.png 218.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image23.png 216.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image22.png 212.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image21.png 211.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/ptt.png 211.3 KB
- 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_25.webm 210.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image00.png 206.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image05.png 204.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/5/media/image02.png 203.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/GPO-RSAT.png 201.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/covenant/ticket.png 200.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/covenant/cracked.png 197.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image18.png 197.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/ticket.png 197.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/fgpwpol-rsat1.png 196.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image04.png 193.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/covenant/ptt.png 193.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/neo4j.png 190.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image14.png 189.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/resources/img/webshell.png 188.5 KB
- 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_29.webm 187.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image19.png 186.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor4/empire/ntlm.png 185.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/rdp-success.PNG 182.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/pivot1-ifconfig.png 181.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/pivot1-ifconfig.png 181.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/jumphost.png 181.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/sharpview-groupenum.png 180.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/workbook.png 175.6 KB
- 2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand.webm 175.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/image05.png 171.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image24.png 171.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/workers/search.5e67fbfe.min.js.map 169.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/output.png 168.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor1/covenant/roast.png 168.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/GPO-RSAT2.png 167.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/wireshark-encrypted.png 166.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image26.png 166.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image14.png 166.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/ssh-bastion.png 165.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/93/3b9823bd803b0e52d60d26505b12ddb500a6fe 163.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/26/a2ff5efa99622c7bf7d8b6853885fc3af41cd3 163.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/3c/4617241c5a0ddbb53b50fc62b7a346549cd939 162.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image02.png 159.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/krbtgt.png 156.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/ssh-bastion.png 155.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/ftp-get-key.png 154.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image11.png 153.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/fit-window.png 153.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/certgen.png 153.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/covenant/tgt.png 152.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image01.png 152.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/covenant/hraccess.png 151.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image29.png 150.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image09.png 150.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/covenant/dcsync.png 149.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor3/covenant/dcsync.png 148.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/computermmc.png 148.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/wireshark-base64.png 148.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/displays.png 145.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image02.png 145.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image02.png 145.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/RSAT-pwpol.png 144.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/1/media/image08.png 144.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/krbtgt.png 144.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image15.png 143.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/sharphound-covenant.png 142.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/proxychains.png 142.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/proxychains.png 142.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/media/image05.png 140.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/sec565.4.1/index.html 140.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image07.png 140.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/5/media/image03.png 137.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/vulntemplate.png 137.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/beacon1.png 137.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/beacon1.png 137.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/image07.png 136.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/wireshark-certreq.png 135.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image10.png 135.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/js/jquery.min.map 134.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/5/media/image00.png 134.3 KB
- 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_3.webm 133.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/assets/stylesheets/main.644de097.min.css 132.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/pivot1.png 131.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/pivot1.png 131.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/empire/dcsyncsuccess.png 131.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/resources/img/virtual-machine-credentials/virtual-machine-information-panel-workstation.png 131.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image21.png 129.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image06.png 127.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/altname.png 127.8 KB
- 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_18_2.webm 127.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image13.png 126.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image20.png 125.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image10.png 125.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/wireshark-ssh.png 124.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/spotlight.png 123.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image11.png 123.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/1/media/image02.png 123.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image03.png 123.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/media/image02.png 123.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image02.png 123.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/ftp.png 123.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/ftp.png 123.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/sacrifical.png 122.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/spotlight-plain.png 122.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/childhop/covenant/extrasids.png 122.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/images/vpn-connect.png 122.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image08.png 121.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image10.png 121.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/decrypted.png 121.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/images/test-connect.png 119.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image06.png 118.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image18.png 118.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image03.png 118.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image00.png 116.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image00.png 116.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image06.png 115.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/empire/vulntemplate.png 113.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image15.png 112.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image15.png 112.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image19.png 112.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/5/media/image01.png 112.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image00.png 112.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image00.png 112.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image00.png 112.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/1/media/image00.png 112.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image00.png 112.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/media/image00.png 112.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image00.png 112.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/image00.png 112.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image24.png 112.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image11.png 111.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/image01.png 110.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image13.png 110.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image09.png 110.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/sharphoundtask.png 110.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image01.png 109.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image01.png 109.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image01.png 109.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/1/media/image01.png 109.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image01.png 109.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/media/image01.png 109.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image01.png 109.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/image01.png 109.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/childhop/covenant/dcsync.png 109.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/spawnas.png 108.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/bundle.c44cc438.min.js 108.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image27.png 107.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/RSAT-gmsa.png 107.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/covenant/pth.png 106.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/image01.png 104.3 KB
- 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/SEC450- SANS OnDemand_20.webm 104.0 KB
- 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_21.webm 103.9 KB
- 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_2.webm 103.9 KB
- 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/SEC450- SANS OnDemand_21.webm 103.7 KB
- 2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/SEC450- SANS OnDemand.webm 103.5 KB
- 2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/SEC450- SANS OnDemand_20.webm 103.3 KB
- 2020/Sec450 Video/Section 1/1.9 DAY 1 SUMMARY/SEC450- SANS OnDemand_4.webm 103.3 KB
- 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_5.webm 103.2 KB
- 2020/Sec450 Video/Section 1/1.9 DAY 1 SUMMARY/SEC450- SANS OnDemand.webm 103.1 KB
- 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/SEC450- SANS OnDemand_24.webm 103.0 KB
- 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_4.webm 102.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image23.png 102.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/stager.png 102.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image09.png 102.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image05.png 101.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image09.png 101.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image01.png 101.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image01.png 101.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image12.png 101.2 KB
- 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/SEC450- SANS OnDemand.webm 101.0 KB
- 2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/SEC450- SANS OnDemand_14_2.webm 100.9 KB
- 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_26.webm 100.9 KB
- 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/SEC450- SANS OnDemand_27.webm 100.8 KB
- 2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/SEC450- SANS OnDemand_26.webm 100.8 KB
- 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/SEC450- SANS OnDemand_30_2.webm 100.7 KB
- 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/SEC450- SANS OnDemand_4.webm 100.7 KB
- 2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_18.webm 100.6 KB
- 2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/SEC450- SANS OnDemand_20_2.webm 100.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image04.png 100.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image04.png 100.1 KB
- 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/SEC450- SANS OnDemand_13.webm 99.5 KB
- 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/SEC450- SANS OnDemand_28.webm 99.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/translated-securitydescriptor.png 99.4 KB
- 2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/SEC450- SANS OnDemand_13.webm 99.3 KB
- 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/SEC450- SANS OnDemand_5.webm 99.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image11.png 99.2 KB
- 2020/Sec450 Video/Section 3/3.9 DAY 3 SUMMARY/SEC450- SANS OnDemand.webm 99.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image09.png 98.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image09.png 98.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/bloodhound-local-admin-information.PNG 98.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/rsat-dns.png 97.8 KB
- 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_30.webm 96.7 KB
- 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/SEC450- SANS OnDemand_27.webm 96.5 KB
- 2020/Sec450 Video/Section 2/2.9 DAY 2 SUMMARY/SEC450- SANS OnDemand_3_2.webm 96.5 KB
- 2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/SEC450- SANS OnDemand.webm 96.4 KB
- 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/SEC450- SANS OnDemand.webm 96.0 KB
- 2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/SEC450- SANS OnDemand.webm 95.9 KB
- 2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_5_2.webm 95.7 KB
- 2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/SEC450- SANS OnDemand_14.webm 95.6 KB
- 2020/Sec450 Video/Section 2/2.9 DAY 2 SUMMARY/SEC450- SANS OnDemand_13.webm 95.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image05.png 95.4 KB
- 2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_3_2.webm 94.8 KB
- 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/SEC450- SANS OnDemand_25.webm 93.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image07.png 93.5 KB
- 2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/SEC450- SANS OnDemand_16_2.webm 93.5 KB
- 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/SEC450- SANS OnDemand_4.webm 93.4 KB
- 2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/SEC450- SANS OnDemand_5.webm 93.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image17.png 92.9 KB
- 2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/SEC450- SANS OnDemand_3_2.webm 91.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/pidmimi.png 91.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image25.png 91.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/5/media/image04.png 90.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/covenant/ptt.png 90.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image03.png 90.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/stealtoken.png 89.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image22.png 89.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/wireshark.png 89.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image13-1.png 88.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image11.png 87.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image05.png 87.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/js/jquery.min.js 87.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image17.png 87.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image11.png 86.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image11.png 86.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/js/jquery-3.4.1.min.js 86.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/cert.PNG 85.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/media/image10.png 85.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/psremoting.png 84.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image16.png 84.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/media/image09.png 83.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/1/media/image09.png 83.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/decode-base64.png 83.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/1/media/image05.png 82.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/proxychains-rdp.PNG 81.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/successfullrdp.png 81.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/snapin.png 81.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/media/image07.png 80.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image14.png 80.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/maketoken.png 80.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/mac-unzip.png 79.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/mac-mount.png 78.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image10.png 78.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/nc-encrypted.png 78.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/empire/certsuccess.png 78.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/1/media/image07.png 78.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/curl.png 78.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/sacrificalsession.png 77.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/1/media/image06.png 77.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image14.png 76.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image14.png 76.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/mac-mount-plain.png 76.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/sec565.5.1/index.html 76.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image25.png 75.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/childhop/covenant/krbtgt.png 75.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/media/image08.png 75.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/image04.png 74.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/media/image04.png 74.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/processlist.png 73.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image20.png 73.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/media/image06.png 73.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/childhop/empire/draconemkrbtgt.png 72.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor3/empire/dcsyncsuccess.png 72.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image06.png 72.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image10.png 71.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image10.png 71.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adexplorergui.png 71.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/certify.png 70.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/covenant/dcsync.png 69.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/childhop/covenant/trust.png 69.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/gpocomputeradmin.png 68.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/nc-base64.png 68.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image12.png 67.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image12.png 67.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image02.png 67.6 KB
- 2020/Sec450 Video/Section 1/1.9 DAY 1 SUMMARY/SEC450- SANS OnDemand_3.webm 67.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/pth.png 66.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image13.png 66.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/js/jquery.fancybox.min.js 66.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/empire/download.png 66.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/covenant/fileshareaccess2.png 66.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/newou.png 66.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/download.png 65.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image28.png 65.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image07.png 65.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/proxychainsconf.png 65.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/proxychainsconf.png 65.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/ipv6.png 65.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/sec565.4.4/index.html 64.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/sharpmove.png 64.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/nc-plain.png 64.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image04.png 63.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/sharpshares.png 63.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/getnetlocalgroupmember.png 62.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image08.png 62.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/image06.png 62.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image13.png 61.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/getdomaingroup.png 61.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/sec565.4.2/index.html 61.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/wheresaved.png 60.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image11.png 60.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor3/empire/spawnas.png 60.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/ptt.png 60.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image12.png 60.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image12.png 59.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image08.png 59.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/media/image12.png 59.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/regloggedon.png 58.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image13.png 58.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image13.png 58.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/newuser.png 58.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image16.png 58.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path3/workaround.png 58.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/getnetlocalgroupmember-remote.png 58.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/rubeus-monitor.png 58.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image07.png 58.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/sec565.2.4/index.html 58.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor4/empire/whiskersuccess.png 58.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/1/media/image03.png 58.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/media/image04.png 58.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/media/image03.png 58.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/media/image03.png 58.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/neo4jconnect.png 57.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/gpocomputeradmin.png 57.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/mac-mounted.png 57.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/users.png 57.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/advancedfeatures.png 56.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/1/media/image04.png 56.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/snmp-diagram.png 56.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/moddedpowerview.png 55.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/mac-mounte-plain.png 55.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/empire/monitor.png 55.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/luid.png 55.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/ff/494860fa56a838026843de0ba1a04005630e1a 55.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/3/sec565.3.3/index.html 55.0 KB
- 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/SEC450- SANS OnDemand_23.webm 54.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image06.png 54.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image06.png 54.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/rubeus.png 53.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/sec565.5.2/index.html 53.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/4/sec565.1.4/index.html 53.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image05.png 53.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image05.png 53.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/invokerubeus.png 53.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/ipv6-diagram.png 53.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/invoke-mmc20.png 53.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/getnetlocalgroupmember.png 51.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/fgpwpol-rsat2.png 51.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/updatescript.png 51.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/sec565.1.3/index.html 51.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/bloodhound-recruiting-info.PNG 51.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/childhop/empire/extrasids.png 51.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/RSAT-pwpol2.png 51.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/containerprops.png 50.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image07.png 50.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image07.png 50.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image08.png 50.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image08.png 50.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/windows-extract.png 50.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/download.png 49.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/sec565.1.0/index.html 49.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/upload.png 49.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/sec565.2.1/index.html 49.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/mac-open-vm.png 49.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/getnetsession.png 49.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/pwresetneo.png 48.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/covenant/fileshareaccess.png 48.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/windows-extract-plain.png 48.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/properties.png 48.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adexp-trust.png 48.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image04.png 47.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image04.png 47.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/5/sec565.1.5/index.html 47.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/socks-traffic.PNG 47.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/sockstraffic.png 47.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/sacrificalprocess.png 47.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/empire/sacrificial.png 47.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/empire/token.png 46.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/sec565.1.2/index.html 46.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/changerights.png 46.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image07.png 46.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image05.png 46.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/1/sec565.3.1/index.html 46.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/childhop/empire/devsync.png 46.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/1/media/image00.png 46.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor3/empire/pwreset.png 45.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image06.png 45.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/mac-open-vm-plain.png 45.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path3/covenant/servicecreation.png 45.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/regloggedon.png 45.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/invoke-schtasklatmove.png 45.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/covenant/runas.png 45.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/empire/certreq.png 45.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/finder.png 44.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/neo4j-pw.PNG 44.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/getnetloggedonuser.png 44.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image03.png 44.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image03.png 44.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/stealtoken.png 44.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor1/empire/kerberoast.png 44.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/sec565.4.3/index.html 44.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/getnetsession.png 44.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/image02.png 44.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/assets/stylesheets/main.644de097.min.css.map 44.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor4/empire/whisker.png 44.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path3/empire/standin.png 43.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/dcomgrunt-callback.png 43.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/image04.png 43.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/openssl.PNG 42.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/4/sec565.3.4/index.html 42.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/covenant/rev2self.png 42.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/empire/dcsync-tbird.png 42.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/sec565.2.5/index.html 42.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/empire/findtemplates.png 42.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_3/2/sec565.3.2/index.html 42.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/3/media/image02.png 41.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/image02.png 41.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/servicecreation.png 41.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/net-administrator.png 41.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/1/sec565.1.1/index.html 40.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/sec565.2.2/index.html 40.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/empire/ptt-tbird.png 40.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/DCOMOptions.png 40.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/sec565.2.3/index.html 40.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/agents.PNG 39.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/scmscriptexec.png 39.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/sec565.5.3/index.html 38.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/sec565.5.4/index.html 38.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/covenant/asktgt.png 38.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/stager.png 38.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/powerviewcomputer.png 38.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/dcomgrunt.png 37.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/ssh-transfer.png 37.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/childhop/empire/sacrifical.png 37.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor4/empire/rubeus.png 37.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/4/media/escalation.png 36.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/windows-poweron.png 36.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/pivot2-diagram.png 35.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor1/covenant/spn.png 35.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/mac-move-file.png 35.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/mac-iso.png 35.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/workers/search.5e67fbfe.min.js 35.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/dcsync.png 35.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/empire/spool.png 35.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/rev2self.png 35.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/beacon1-diagram.png 35.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/beacon1-diagram.png 35.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/spoolsample.png 34.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/invokesocks.png 34.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/empire/maketoken.png 34.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/image15.png 33.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/empire/ptt.png 33.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/SharpAdidnsdump.png 32.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/mac-moved-it.png 32.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/1/media/image03.png 32.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/image03.png 32.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path3/covenant/success.png 32.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/socks-proxy-ftp-diagram.png 32.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/socks-proxy-ftp-diagram.png 32.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/covenant/monitor.png 32.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/spawnas2.png 32.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path3/covenant/standin.png 32.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/empire/asktgt-cert.png 32.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/psexec-execution.png 31.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/sharefinder.png 31.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor3/covenant/spawn.png 31.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/winrm.PNG 31.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/psexecgrunt.png 31.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/windows-mount.png 31.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path3/empire/s4u.png 31.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/computer-admodule.png 31.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/powerviewuserenum.png 31.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/covenant/powershellgrunt.png 30.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/img/SANS-Offensive-Operations-Logo.png 29.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/resources/syntax/index.html 29.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/image03.png 29.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/img/SANS-Offensive-Operations_Logo-Web-1.png 29.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor4/covenant/rubeus.png 29.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/image06.png 29.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path3/empire/invokepsexec.png 29.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/covenant/maketoken.png 29.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/resources/about-labs/index.html 29.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/empire/location.png 28.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/pivot1-diagram.png 28.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/pivot1-diagram.png 28.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/childhop/empire/dcsync.png 28.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path2/empire/dcsync.png 28.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor3/empire/krbtgt.png 28.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/sharphound.png 28.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/48/9616ae2cc8cef6b317b082271b78dc1c0260f2 28.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor4/covenant/whisker.png 28.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/covenant/spooler.png 28.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/image00.png 28.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/covenant/sacrificialsession.png 28.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/covenant/rubeus.png 28.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/3/media/bastion-diagram-1.png 27.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/5/media/bastion-diagram-1.png 27.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor3/covenant/standin.png 27.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/fgpwpol-adfind.png 27.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/listfiles.png 27.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/runas.png 27.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/reverse-socks.PNG 27.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/ghostcontainer.png 27.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/psexec.png 27.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/index.html 26.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/netlocalgroupcmd.png 26.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adfind1.png 26.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/resources/license/index.html 26.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/empire/location.png 26.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/socksserver.png 26.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/mmc.PNG 25.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/bloodhound-recruiting.PNG 25.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/covenant/sacrificial.png 25.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/workbook-update.png 25.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/resources/virtual-machine-credentials/index.html 25.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/resources/whats-in-media/index.html 25.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/childhop/covenant/sacrificial.png 25.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/sharphound-covenant-download.png 24.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/windows-mounted.png 24.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/4/media/redirection.png 24.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/fgpwpol-custom.png 24.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/covenant/monitor.png 24.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/getnetloggedonuser.png 24.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/empire/processlist.png 23.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/windows-openvm.png 23.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/windows-mounted-plain.png 23.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adfind-computers.png 22.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/childhop/empire/trust.png 22.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/pack/pack-a5835f7443762e31a13a10fffe23d05818565349.idx 22.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/tinyseg.js 22.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/covenant/roastticket.png 22.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/windows-iso.png 22.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/covenant/processimpersonation.png 21.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/scmcallback.png 21.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_2/2/media/image08.png 21.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/remotingtask.png 20.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adusersandcomputers.png 20.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/404.html 20.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/LAPS-LAPSToolkit.png 20.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/LAPSToolKit.png 20.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adsi-passwordpolicy.png 20.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/systemgrunt.PNG 20.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/wmi.png 20.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/pack/pack-8738db4f374c1f90340e72cd7592dc8a00d61e7d.idx 20.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/domainpolicy-powerview.png 20.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/stagerscript.png 20.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/only-it-admodule.png 18.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/smbadexplorer.png 18.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adsi-users.png 18.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/84/75f97076f26f1850af73353b5d41113cacbec8 17.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/05/23dc52f56dd3ac1072e7b234d7831c903e448d 17.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/powershellremoting.png 17.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adfind2.png 17.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/image02.png 17.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/fgpwpol-admodule-highpriv.png 16.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/gmsa-powerview.png 16.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/2c/56dfcc4a6dd315447dae451f939e6c67b810b1 16.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor1/empire/setspn.png 16.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.ar.min.js 16.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/deny-all.png 16.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/socksserver.PNG 15.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/powershell.png 15.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/covenant/spool.png 15.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/advanced.png 15.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/httpserver.png 15.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/windows-extract-progress.png 15.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/powerviewtrust.png 15.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/wmic.png 14.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/pwpol-adfind.png 14.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.tr.min.js 14.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/gmsa-adfind.png 14.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/windows-extract-destination.png 14.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adfind-trust.png 13.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/psexec.png 13.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/domain-policy-admodule.png 13.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-agents.png 13.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/usersandcomputers.png 13.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/roothop/empire/ticket.png 13.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/image09.png 13.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/getnetlocalgroupmember-remote.png 13.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/e0/2aadd84c3e0afe4f00df88a585f06d37c70aa4 13.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/0/media/windows-extract-destination-plain.png 12.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/css/jquery.fancybox.min.css 12.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/maketoken.png 12.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/fileshareaccess.png 12.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/empire/hraccess.png 12.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-listeners.png 12.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-settings.png 12.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/ssh.png 11.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/psexec-callback.png 11.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.es.min.js 11.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/3/media/covenant/gruntcheckin.png 11.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-credentials.png 11.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/certreq.png 11.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/2/media/covenant/changedir.png 11.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/3/media/certutil.png 11.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-stagers.png 11.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.it.min.js 11.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-modules.png 10.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-upload.png 10.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-users.png 10.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-download.png 10.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.ro.min.js 10.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/admodule-users.png 10.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adexp-ldapsearch.png 10.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.fr.min.js 10.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/assets/stylesheets/palette.e6a45f82.min.css 10.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/computeradsi.png 10.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/wmi-callback.png 10.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.ru.min.js 10.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-plugins.png 10.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/LAPS-ADFind.png 10.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.pt.min.js 9.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path1/covenant/taskkill.png 9.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/scmcallback.png 9.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/img/favicon.ico 9.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-actions.png 9.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.hu.min.js 9.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/images/empire-reporting.png 9.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/only-description-users.png 9.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.fi.min.js 9.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adsidomainadmin.png 9.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/ou-noprot.png 8.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adsi-passwordpolicy2.png 8.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adsi-trust.png 8.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/fgpwpol-adsi.png 7.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/userui.png 7.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/1/media/path3/covenant/systemgrunt.png 7.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/gmsa-adsi.png 7.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/admodule-dns.png 7.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/empire/callback-psremote.png 7.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/admodule-trust.png 7.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/4/media/covenant/wmi-grunt.png 7.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/ca/84ac1073aae359ac1e5b8f9325870b17e21f23 6.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_5/2/media/backdoor2/gui/replicationrights.png 6.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.du.min.js 6.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/gmsa-admodule.png 6.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.de.min.js 6.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/LAPS-ADModule.png 5.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/pack/pack-90b4589ad74a56edf25af390111108b7a85dc922.idx 5.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.nl.min.js 5.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/adexplorer.png 5.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/LAPS-adsi.png 5.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/css/html.css 5.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_4/1/media/LAPS-Powerview.png 5.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/img/sans-logo.png 4.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/pack/pack-1f71ccc745b2d328a7b9e0611be72e6f5869c7b5.idx 4.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/color-icon.png 4.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/.git/hooks/pre-rebase.sample 4.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/search-icon.png 4.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.no.min.js 4.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.da.min.js 4.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/labs/565_1/2/media/expand-icon.png 4.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.sv.min.js 4.4 KB
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/pack/pack-03bdfb6e4174a4f0d659f690a6368cd0960936e3.idx 4.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/.git/logs/HEAD 4.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/sitemap.xml 3.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.stemmer.support.min.js 3.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/.git/hooks/update.sample 3.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.hi.min.js 3.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/.git/hooks/fsmonitor-watchman.sample 3.2 KB
- 2022/SEC565 Workbook/SEC565/workbook/assets/stylesheets/palette.e6a45f82.min.css.map 3.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/resources/create_workbook-update_task.ps1 2.7 KB
- 2022/SEC565 Workbook/SEC565/workbook/resources/workbook-update.sh 2.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.ja.min.js 2.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/3d/8421e59a505bdf9ba985880eaf6d36aaddbb48 2.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/ea/fa574bada54914d166fb3acde997aacb0a2a64 2.1 KB
- 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.zh.min.js 2.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/img/magnify.png 1.9 KB
- 2022/SEC565 Workbook/SEC565/workbook/assets/images/favicon.png 1.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/css/pdf.css 1.8 KB
- 2022/SEC565 Workbook/SEC565/workbook/.git/hooks/pre-commit.sample 1.6 KB
- 2022/SEC565 Workbook/SEC565/workbook/.git/hooks/prepare-commit-msg.sample 1.5 KB
- 2022/SEC565 Workbook/SEC565/workbook/.git/hooks/pre-push.sample 1.3 KB
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/2f/8640a031993b3c67512637025321e2b16c3f48 1.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.th.min.js 1.0 KB
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/53/de862cb943ba1549b3f74dc36915b30d433560 978 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/hooks/commit-msg.sample 896 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/b8/207d92d91c81e2146a51d0ade6e658419d02df 847 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/a3/fc67491d0c0773f5109e11f63e65342ce57223 846 bytes
- 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.multi.min.js 817 bytes
- 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.vi.min.js 784 bytes
- 2022/SEC565 Workbook/SEC565/workbook/css/custom.css 708 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/logs/refs/remotes/origin/H02 655 bytes
- 2022/SEC565 Workbook/SEC565/workbook/resources/ewb-update.cron 647 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/logs/refs/heads/H02 630 bytes
- 2022/SEC565 Workbook/SEC565/workbook/js/workbook.js 588 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/hooks/pre-receive.sample 544 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/hooks/applypatch-msg.sample 478 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/a1/84b0ce3805d5ad6444ea18f238fb6584ab1f3c 432 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/hooks/pre-applypatch.sample 424 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/da/7d6e61c7d55d668daa9926a6711e1ec00025d4 408 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/e6/b940a862d66a6aa17f0307881cb2727fe826a6 408 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/4e/d2a7607a6682e5935607ca0ca91e0196c8316a 406 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/67/5fdf2b545027596a7b495ace99743303318d01 385 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/0d/edc770eea99e0b5b4669ee41d1a43a517e964f 384 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/9e/9e8ad53c5a50468f8aaf0f6b700669a096db00 383 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/88/c067a6e8d679991490eb03d3d81afc54ced430 383 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/ee/7fd17c297f539e8cc87c62218f16afd02fb1c9 383 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/61/1238327845b03cff69177e2f418eefe07e913d 382 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/b1/da70439c537b4231ac210462ae916498622105 382 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/26/37097d4f94c6abb01a2af700e9c86583f76303 362 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/logs/refs/heads/H01 361 bytes
- 2022/SEC565 Workbook/SEC565/workbook/resources/ewb-update.service 353 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/5d/7bc8cb8beef81ca6a47375280d9475aa9a0042 342 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/00/6fd2eb57dbc0e5142ecae18e399a2d04f335fb 291 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/fd/cf45be784b759cc32e53416508c5a942a5f024 291 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/cc/a6c95daae6170e62d10b4ea1afb754c99ce3d2 252 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/02/fed966c84d52b949af3800ebf03aefae36fd27 241 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/info/exclude 240 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/02/d571a5646a1be47b05eacead6838733bcdc45c 235 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/3a/7ba5dc6429f2e9fa3845c637555bf9bd6bad1c 235 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/5f/15446dfcd9929f5cbd8d98233728c8360196b7 235 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/09/b520f06003a8e93757a5a7c9d2526d72b35de7 235 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/17/aaf30eb9fe9b7b491f410725398bb08c0f5835 235 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/27/1557900d2ee8d1528b6d801428f836e8ee89e1 235 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/62/739e4fee5aa66b5be23a5cea1ebc33129d247b 235 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/f3/a5ba4489c938d3d367d4b22fbdddfb92c3a98f 235 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/1f/27b47ff2ba38a5d11b90efe2a9c81f8e296c1d 233 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/84/c38044b8eca9d77261866e1f2139cd7e2f1ba0 232 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/24/d09afff17f71bb288796c414d8f13cabca4d9f 217 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/bd/53ba48ced073cd40e7b9d84d77c3d0b992629a 217 bytes
- 2022/SEC565 Workbook/SEC565/workbook/sitemap.xml.gz 216 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/hooks/post-update.sample 189 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/aa/986bb76eac578ad8141d2cbbb87cab69f4a1e8 177 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/af/e8821fddcf33c87a74780fb0b25fbb3a292d98 177 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/logs/refs/remotes/origin/H01 168 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/f6/2c97053b67350781c91022e6c7502732af647d 159 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/98/1b7f78504388ecc59386d784aea66eaf0666ba 158 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/9d/af28ce076c9caefc698d358c1bf2e8d5c51cc7 157 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/14/aab081f4168b1b8ac88d54cab6fce1f917844e 140 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/21/dbd4683f80236d88c6b3fd93b74ce24b2b064c 139 bytes
- 2022/SEC565 Workbook/SEC565/workbook/README.md 138 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/38/4ad0535449cd92d4be44bb661904691ecd9f97 138 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/da/0ef3a7397c5983946944fcf189e0c47a4d4680 138 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/c1/5cb6a204f95b4fbffb8f83933d1555049ad286 137 bytes
- 2020/Sec450 Video/Section 1/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 1/1.1 WELCOME TO BLUE TEAM/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 1/1.2 SOC OVERVIEW/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 1/1.3 DEFENSIBLE NETWORK CONCEPTS/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 1/1.4 EVENTS, ALERTS, ANOMALIES AND INCIDENTS/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 1/1.5 INCIDENT MANAGEMENT SYSTEMS/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 1/1.6 THREAT INTELLIGENCE PLATFORMS/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 1/1.7 SIEM AND AUTOMATION/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 1/1.8 KNOW YOUR ENEMY/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 1/1.9 DAY 1 SUMMARY/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 2/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 2/2.1 NETWORK ARCHITECTURE/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 2/2.2 TRAFFIC CAPTURE AND ANALYSIS/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 2/2.3 UNDERSTANDING DNS/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 2/2.4 DNS ANALYSIS AND ATTACKS/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 2/2.5 UNDERSTANDING HTTP(S)/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 2/2.6 HTTP ANALYSIS AND ATTACKS/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 2/2.7 UNDERSTANDING SMTP AND EMAIL/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 2/2.8 ADDITIONAL NETWORK PROTOCOLS/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 2/2.9 DAY 2 SUMMARY/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 3/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 3/3.1 ENDPOINT ATTACK TACTICS/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 3/3.2 ENDPOINT DEFENSE IN DEPTH/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 3/3.3 HOW WINDOWS LOGGING WORKS/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 3/3.4 HOW LINUX LOGGING WORKS/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 3/3.5 INTERPRETING IMPORTANT EVENTS/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 3/3.6 LOG COLLECTION, PARSING AND NORMALIZATION/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 3/3.7 FILE CONTENTS AND IDENTIFICATION/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 3/3.8 IDENTIFYING AND HANDLING SUSPICIOUS FILES/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 3/3.9 DAY 3 SUMMARY/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 4/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 4/4.1 ALERT TRIAGE AND PRIORITIZATION/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 4/4.2 PERCEPTION, MEMORY AND INVESTIGATION/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 4/4.3 MODELS AND CONCEPTS FOR INFOSEC/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 4/4.4 STRUCTURED ANALYTICAL TECHNIQUES/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 4/4.5 ANALYSIS QUESTIONS AND TACTICS/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 4/4.6 ANALYSIS OPSEC/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 4/4.7 INTRUSION DISCOVERY/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 5/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 5/5.1 IMPROVING LIFE IN THE SOC/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 5/5.2 ANALYTIC FEATURES AND ENRICHMENT/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 5/5.3 NEW ANALYTIC DESIGN, TESTING AND SHARING/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 5/5.4 TUNING AND FALSE POSITIVE REDUCTION/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 5/5.5 AUTOMATION & ORCHESTRATION/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 5/5.6 IMPROVING OPERATIONAL EFFICIENCY AND WORKFLOW/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 5/5.7 CONTAINING IDENTIFIED INTRUSIONS/desktop.ini 136 bytes
- 2020/Sec450 Video/Section 5/5.8 SKILL AND CAREER DEVELOPMENT/desktop.ini 136 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/76/8d34dbd14477adffedc8bb65d837683a51cccf 124 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/7e/9241be456ba52126ed989fabe0e652c5880159 120 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/2d/998800e82714f9bf49a526dad58579005ce6f8 119 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/68/47174915d557c8625d476e01729b2c1d569fe6 119 bytes
- 2022/SEC565 Workbook/SEC565/workbook/js/custom.js 102 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/2f/9135021c129ef110d51ddb8baf22ffcb37aaa1 81 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/3f/e5cbc0b2fb3a786225094600890dca934ec58e 81 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/7c/0638d285788a4719c5e51142e0e4de56b526f1 81 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/24/ad4f7777bd15fc57ef2baea5f0342ca66d1d4b 81 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/f4/4234e84a5e2b1e16ad42692240feecce88b2c9 81 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/4e/d14d631c5f245bba1a0089218b696edf85b181 62 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/8a/7f3976f26e9940fe7e84e5365b1a5b9d5553ca 62 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/c0/d978c3a5b6037cf3bfc471d7904da4811559bd 62 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/2c/7163b45ffd47628c2daa1726b1ae2877193e38 55 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/3e/772c297763593ef17d6d7712a4dec35a6b1b95 55 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/29/25ff65c0d7357e82cd854a97212950c96ea5d5 55 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/43/f529331ee38bf30f496dbfebd10ac244ff41d6 55 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/a9/ec9118fe728cab54b83fcf4738ce1448c9d479 55 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/objects/cc/e1f6306299917e72b85ecd9cb24f676613fdb3 54 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/refs/heads/H01 41 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/refs/heads/H02 41 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/refs/remotes/origin/H01 41 bytes
- 2022/SEC565 Workbook/SEC565/workbook/.git/refs/remotes/origin/H02 41 bytes
- 2022/SEC565 Workbook/SEC565/workbook/assets/javascripts/lunr/min/lunr.jp.min.js 36 bytes
- 2020/Sec450 PDF/PDF Password.txt 21 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.