Long past the 1.5 TiB barrier...
  • U: Anonymous
  • D: 2018-01-27 09:36:32
  • C: Unknown

RELEASE >

ReScene version pyReScene Auto 0.6 XQZT File size CRC
Download
18,022
Stored files
1,703 CA3BD019
204 F65C7404
RAR-files
lmcsaiaep-9d67-xqzt.rar 50,000,000 F4015679
lmcsaiaep-9d67-xqzt.r00 50,000,000 9385617D
lmcsaiaep-9d67-xqzt.r01 50,000,000 FFA0DECA
lmcsaiaep-9d67-xqzt.r02 50,000,000 978C95B8
lmcsaiaep-9d67-xqzt.r03 50,000,000 4D67109A
lmcsaiaep-9d67-xqzt.r04 22,879,369 B8B84F39

Total size: 272,879,369
Archived files
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\7.6. Managing Privileged Access in Azure\26.Privileged role activation and management.en.srt 5,944 35D95BBE
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\7.6. Managing Privileged Access in Azure\26.Privileged role activation and management.mp4 [adff043c7c98c0c5] 6,171,885 EBF50B84
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\7.6. Managing Privileged Access in Azure\27.Performing an access review.mp4 [8c90ae15f76c3742] 10,546,175 42A5C142
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\7.6. Managing Privileged Access in Azure\27.Performing an access review.en.srt 6,840 E0CD88BE
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\7.6. Managing Privileged Access in Azure\24.What is Azure AD Privileged Identity Management (PIM).en.srt 9,732 BB647371
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\7.6. Managing Privileged Access in Azure\25.Managing privileged role membership.en.srt 8,839 82DC4224
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\7.6. Managing Privileged Access in Azure\25.Managing privileged role membership.mp4 [86e24a47b99e791c] 14,103,623 BE514A8D
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\7.6. Managing Privileged Access in Azure\24.What is Azure AD Privileged Identity Management (PIM).mp4 [c43b9d1ceb7a4162] 9,340,550 05209FB1
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\Exercise Files\Ex_Files_Microsoft_Cybersecurity_AIEP.zip [9f632bf43a5adfe3] 130,800 605C0C4B
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\4.3. Implementing Post-breach Defense with Advanced Threat Analytics (ATA)\11.How ATA Works.mp4 [95d86dd0c0b2abac] 9,314,827 8354E58B
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\4.3. Implementing Post-breach Defense with Advanced Threat Analytics (ATA)\14.Working with suspicious activities.en.srt 10,740 2904D9FD
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\4.3. Implementing Post-breach Defense with Advanced Threat Analytics (ATA)\13.Deploy ATA in six steps.mp4 [3b3430f80651b35d] 12,868,278 55669A3D
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\4.3. Implementing Post-breach Defense with Advanced Threat Analytics (ATA)\13.Deploy ATA in six steps.en.srt 9,881 2BE654C1
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\4.3. Implementing Post-breach Defense with Advanced Threat Analytics (ATA)\15.Managing ATA telemetry and settings.mp4 [cc3034d84644b2af] 5,495,798 6E6F06C1
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\4.3. Implementing Post-breach Defense with Advanced Threat Analytics (ATA)\12.Planning your ATA deployment.en.srt 9,729 3C2F090F
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\4.3. Implementing Post-breach Defense with Advanced Threat Analytics (ATA)\12.Planning your ATA deployment.mp4 [b1fed0a0c75eeda6] 9,397,051 2B15ABCF
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\4.3. Implementing Post-breach Defense with Advanced Threat Analytics (ATA)\14.Working with suspicious activities.mp4 [2a99bf2ad8409ed7] 17,134,655 8D8895DE
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\4.3. Implementing Post-breach Defense with Advanced Threat Analytics (ATA)\15.Managing ATA telemetry and settings.en.srt 5,294 79C31ADA
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\4.3. Implementing Post-breach Defense with Advanced Threat Analytics (ATA)\11.How ATA Works.en.srt 9,007 302F18C0
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\1.Introduction\03.Lab requirements.mp4 [85fa6a7d055e26] 841,176 242DB7CE
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\1.Introduction\01.Welcome.en.srt 2,064 DF9796C0
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\1.Introduction\02.What you should know.mp4 [d444c29ea23c47a3] 510,995 F36C986B
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\1.Introduction\03.Lab requirements.en.srt 887 7190525B
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\1.Introduction\02.What you should know.en.srt 569 78049708
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\1.Introduction\01.Welcome.mp4 [5388a508f79c29fd] 4,302,272 913CE7D6
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\8.Conclusion\28.Next steps.mp4 [cee7dcd1d94d908c] 2,902,768 E06890F0
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\8.Conclusion\28.Next steps.en.srt 1,626 E6F86891
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\6.5. Defending Against Advanced Threats with Windows Defender ATP\21.Assigning user access to the ATP portal.mp4 [5ed06621212bafd9] 8,285,061 854A7AEB
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\6.5. Defending Against Advanced Threats with Windows Defender ATP\21.Assigning user access to the ATP portal.en.srt 6,291 46260EB7
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\6.5. Defending Against Advanced Threats with Windows Defender ATP\22.Investigating alerts in the ATP portal.mp4 [8f33a20fa65bdc7d] 12,712,480 64E8811F
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\6.5. Defending Against Advanced Threats with Windows Defender ATP\22.Investigating alerts in the ATP portal.en.srt 7,416 A37E9612
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\6.5. Defending Against Advanced Threats with Windows Defender ATP\23.Taking response actions in Defender ATP.mp4 [63ec5872f12d635c] 17,199,921 AF5339DF
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\6.5. Defending Against Advanced Threats with Windows Defender ATP\20.Overview of Windows Defender ATP.mp4 [5e77fab9344ce1cc] 9,846,150 703F81FE
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\6.5. Defending Against Advanced Threats with Windows Defender ATP\23.Taking response actions in Defender ATP.en.srt 10,313 A500BA6E
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\6.5. Defending Against Advanced Threats with Windows Defender ATP\20.Overview of Windows Defender ATP.en.srt 10,462 1DE32148
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\3.2. Securing Email with Exchange Online Advanced Threat Protection (ATP)\08.Intro to Exchange Online ATP.en.srt 6,070 FA121EF6
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\3.2. Securing Email with Exchange Online Advanced Threat Protection (ATP)\10.Investigating malicious activity patterns.en.srt 8,268 83C5AB25
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\3.2. Securing Email with Exchange Online Advanced Threat Protection (ATP)\10.Investigating malicious activity patterns.mp4 [95d6eaa30447a07f] 8,544,557 5FF0DFF0
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\3.2. Securing Email with Exchange Online Advanced Threat Protection (ATP)\09.Configuring Exchange ATP policies.en.srt 8,364 CFCC231D
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\3.2. Securing Email with Exchange Online Advanced Threat Protection (ATP)\09.Configuring Exchange ATP policies.mp4 [20465d450f6580c2] 14,523,528 3F3C05F2
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\3.2. Securing Email with Exchange Online Advanced Threat Protection (ATP)\08.Intro to Exchange Online ATP.mp4 [e6836a107ea68bc] 6,224,293 D882E0BC
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\5.4. Protecting Cloud Identities in Azure AD\18.Investigating risk events.mp4 [d1b254b3664dc963] 10,752,387 6CECCCD3
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\5.4. Protecting Cloud Identities in Azure AD\18.Investigating risk events.en.srt 7,082 B9237BA2
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\5.4. Protecting Cloud Identities in Azure AD\19.Set up notification and simulate risk events.mp4 [4eaedd7b321e8512] 11,811,974 1E99519E
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\5.4. Protecting Cloud Identities in Azure AD\16.What is Azure AD Identity Protection.en.srt 6,904 A82B358F
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\5.4. Protecting Cloud Identities in Azure AD\19.Set up notification and simulate risk events.en.srt 7,831 43BF5AB5
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\5.4. Protecting Cloud Identities in Azure AD\16.What is Azure AD Identity Protection.mp4 [75592cd3c2546a25] 8,119,510 8AEBFC77
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\5.4. Protecting Cloud Identities in Azure AD\17.Configure risk levels and policies.mp4 [72790d91d0a4ec26] 14,782,663 8CD3AEB9
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\5.4. Protecting Cloud Identities in Azure AD\17.Configure risk levels and policies.en.srt 10,291 3318A899
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\2.1. Configuring Virtualization-Based Security (VBS) in Windows 10\04.What is virtualization-based security.mp4 [f096577f36dba21b] 8,093,901 E480D473
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\2.1. Configuring Virtualization-Based Security (VBS) in Windows 10\05.Deploy Device Guard.mp4 [ba817aa9f87dcc3] 15,334,510 1AB2E062
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\2.1. Configuring Virtualization-Based Security (VBS) in Windows 10\06.Manage Credential Guard.en.srt 8,080 B01AC8E5
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\2.1. Configuring Virtualization-Based Security (VBS) in Windows 10\05.Deploy Device Guard.en.srt 9,279 F951FAB7
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\2.1. Configuring Virtualization-Based Security (VBS) in Windows 10\07.Working with Windows AppLocker.en.srt 10,264 5A0331A3
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\2.1. Configuring Virtualization-Based Security (VBS) in Windows 10\07.Working with Windows AppLocker.mp4 [6746a215c61835c4] 15,596,288 5FAF67F4
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\2.1. Configuring Virtualization-Based Security (VBS) in Windows 10\06.Manage Credential Guard.mp4 [1095b113656b87d7] 7,771,436 8D7E1E77
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\2.1. Configuring Virtualization-Based Security (VBS) in Windows 10\04.What is virtualization-based security.en.srt 7,768 7944EA86
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\7.6. Managing Privileged Access in Azure 0 00000000
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\Exercise Files 0 00000000
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\4.3. Implementing Post-breach Defense with Advanced Threat Analytics (ATA) 0 00000000
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\1.Introduction 0 00000000
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\8.Conclusion 0 00000000
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\6.5. Defending Against Advanced Threats with Windows Defender ATP 0 00000000
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\3.2. Securing Email with Exchange Online Advanced Threat Protection (ATP) 0 00000000
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\5.4. Protecting Cloud Identities in Azure AD 0 00000000
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\2.1. Configuring Virtualization-Based Security (VBS) in Windows 10 0 00000000
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection 0 00000000

Total size: 272,865,347
RAR Recovery
Not Present
Labels UNKNOWN