Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\7.6. Managing Privileged Access in Azure\26.Privileged role activation and management.en.srt |
5,944 |
35D95BBE |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\7.6. Managing Privileged Access in Azure\26.Privileged role activation and management.mp4
[adff043c7c98c0c5]
|
6,171,885 |
EBF50B84 |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\7.6. Managing Privileged Access in Azure\27.Performing an access review.mp4
[8c90ae15f76c3742]
|
10,546,175 |
42A5C142 |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\7.6. Managing Privileged Access in Azure\27.Performing an access review.en.srt |
6,840 |
E0CD88BE |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\7.6. Managing Privileged Access in Azure\24.What is Azure AD Privileged Identity Management (PIM).en.srt |
9,732 |
BB647371 |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\7.6. Managing Privileged Access in Azure\25.Managing privileged role membership.en.srt |
8,839 |
82DC4224 |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\7.6. Managing Privileged Access in Azure\25.Managing privileged role membership.mp4
[86e24a47b99e791c]
|
14,103,623 |
BE514A8D |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\7.6. Managing Privileged Access in Azure\24.What is Azure AD Privileged Identity Management (PIM).mp4
[c43b9d1ceb7a4162]
|
9,340,550 |
05209FB1 |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\Exercise Files\Ex_Files_Microsoft_Cybersecurity_AIEP.zip
[9f632bf43a5adfe3]
|
130,800 |
605C0C4B |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\4.3. Implementing Post-breach Defense with Advanced Threat Analytics (ATA)\11.How ATA Works.mp4
[95d86dd0c0b2abac]
|
9,314,827 |
8354E58B |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\4.3. Implementing Post-breach Defense with Advanced Threat Analytics (ATA)\14.Working with suspicious activities.en.srt |
10,740 |
2904D9FD |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\4.3. Implementing Post-breach Defense with Advanced Threat Analytics (ATA)\13.Deploy ATA in six steps.mp4
[3b3430f80651b35d]
|
12,868,278 |
55669A3D |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\4.3. Implementing Post-breach Defense with Advanced Threat Analytics (ATA)\13.Deploy ATA in six steps.en.srt |
9,881 |
2BE654C1 |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\4.3. Implementing Post-breach Defense with Advanced Threat Analytics (ATA)\15.Managing ATA telemetry and settings.mp4
[cc3034d84644b2af]
|
5,495,798 |
6E6F06C1 |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\4.3. Implementing Post-breach Defense with Advanced Threat Analytics (ATA)\12.Planning your ATA deployment.en.srt |
9,729 |
3C2F090F |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\4.3. Implementing Post-breach Defense with Advanced Threat Analytics (ATA)\12.Planning your ATA deployment.mp4
[b1fed0a0c75eeda6]
|
9,397,051 |
2B15ABCF |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\4.3. Implementing Post-breach Defense with Advanced Threat Analytics (ATA)\14.Working with suspicious activities.mp4
[2a99bf2ad8409ed7]
|
17,134,655 |
8D8895DE |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\4.3. Implementing Post-breach Defense with Advanced Threat Analytics (ATA)\15.Managing ATA telemetry and settings.en.srt |
5,294 |
79C31ADA |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\4.3. Implementing Post-breach Defense with Advanced Threat Analytics (ATA)\11.How ATA Works.en.srt |
9,007 |
302F18C0 |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\1.Introduction\03.Lab requirements.mp4
[85fa6a7d055e26]
|
841,176 |
242DB7CE |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\1.Introduction\01.Welcome.en.srt |
2,064 |
DF9796C0 |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\1.Introduction\02.What you should know.mp4
[d444c29ea23c47a3]
|
510,995 |
F36C986B |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\1.Introduction\03.Lab requirements.en.srt |
887 |
7190525B |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\1.Introduction\02.What you should know.en.srt |
569 |
78049708 |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\1.Introduction\01.Welcome.mp4
[5388a508f79c29fd]
|
4,302,272 |
913CE7D6 |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\8.Conclusion\28.Next steps.mp4
[cee7dcd1d94d908c]
|
2,902,768 |
E06890F0 |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\8.Conclusion\28.Next steps.en.srt |
1,626 |
E6F86891 |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\6.5. Defending Against Advanced Threats with Windows Defender ATP\21.Assigning user access to the ATP portal.mp4
[5ed06621212bafd9]
|
8,285,061 |
854A7AEB |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\6.5. Defending Against Advanced Threats with Windows Defender ATP\21.Assigning user access to the ATP portal.en.srt |
6,291 |
46260EB7 |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\6.5. Defending Against Advanced Threats with Windows Defender ATP\22.Investigating alerts in the ATP portal.mp4
[8f33a20fa65bdc7d]
|
12,712,480 |
64E8811F |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\6.5. Defending Against Advanced Threats with Windows Defender ATP\22.Investigating alerts in the ATP portal.en.srt |
7,416 |
A37E9612 |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\6.5. Defending Against Advanced Threats with Windows Defender ATP\23.Taking response actions in Defender ATP.mp4
[63ec5872f12d635c]
|
17,199,921 |
AF5339DF |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\6.5. Defending Against Advanced Threats with Windows Defender ATP\20.Overview of Windows Defender ATP.mp4
[5e77fab9344ce1cc]
|
9,846,150 |
703F81FE |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\6.5. Defending Against Advanced Threats with Windows Defender ATP\23.Taking response actions in Defender ATP.en.srt |
10,313 |
A500BA6E |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\6.5. Defending Against Advanced Threats with Windows Defender ATP\20.Overview of Windows Defender ATP.en.srt |
10,462 |
1DE32148 |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\3.2. Securing Email with Exchange Online Advanced Threat Protection (ATP)\08.Intro to Exchange Online ATP.en.srt |
6,070 |
FA121EF6 |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\3.2. Securing Email with Exchange Online Advanced Threat Protection (ATP)\10.Investigating malicious activity patterns.en.srt |
8,268 |
83C5AB25 |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\3.2. Securing Email with Exchange Online Advanced Threat Protection (ATP)\10.Investigating malicious activity patterns.mp4
[95d6eaa30447a07f]
|
8,544,557 |
5FF0DFF0 |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\3.2. Securing Email with Exchange Online Advanced Threat Protection (ATP)\09.Configuring Exchange ATP policies.en.srt |
8,364 |
CFCC231D |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\3.2. Securing Email with Exchange Online Advanced Threat Protection (ATP)\09.Configuring Exchange ATP policies.mp4
[20465d450f6580c2]
|
14,523,528 |
3F3C05F2 |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\3.2. Securing Email with Exchange Online Advanced Threat Protection (ATP)\08.Intro to Exchange Online ATP.mp4
[e6836a107ea68bc]
|
6,224,293 |
D882E0BC |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\5.4. Protecting Cloud Identities in Azure AD\18.Investigating risk events.mp4
[d1b254b3664dc963]
|
10,752,387 |
6CECCCD3 |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\5.4. Protecting Cloud Identities in Azure AD\18.Investigating risk events.en.srt |
7,082 |
B9237BA2 |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\5.4. Protecting Cloud Identities in Azure AD\19.Set up notification and simulate risk events.mp4
[4eaedd7b321e8512]
|
11,811,974 |
1E99519E |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\5.4. Protecting Cloud Identities in Azure AD\16.What is Azure AD Identity Protection.en.srt |
6,904 |
A82B358F |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\5.4. Protecting Cloud Identities in Azure AD\19.Set up notification and simulate risk events.en.srt |
7,831 |
43BF5AB5 |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\5.4. Protecting Cloud Identities in Azure AD\16.What is Azure AD Identity Protection.mp4
[75592cd3c2546a25]
|
8,119,510 |
8AEBFC77 |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\5.4. Protecting Cloud Identities in Azure AD\17.Configure risk levels and policies.mp4
[72790d91d0a4ec26]
|
14,782,663 |
8CD3AEB9 |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\5.4. Protecting Cloud Identities in Azure AD\17.Configure risk levels and policies.en.srt |
10,291 |
3318A899 |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\2.1. Configuring Virtualization-Based Security (VBS) in Windows 10\04.What is virtualization-based security.mp4
[f096577f36dba21b]
|
8,093,901 |
E480D473 |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\2.1. Configuring Virtualization-Based Security (VBS) in Windows 10\05.Deploy Device Guard.mp4
[ba817aa9f87dcc3]
|
15,334,510 |
1AB2E062 |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\2.1. Configuring Virtualization-Based Security (VBS) in Windows 10\06.Manage Credential Guard.en.srt |
8,080 |
B01AC8E5 |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\2.1. Configuring Virtualization-Based Security (VBS) in Windows 10\05.Deploy Device Guard.en.srt |
9,279 |
F951FAB7 |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\2.1. Configuring Virtualization-Based Security (VBS) in Windows 10\07.Working with Windows AppLocker.en.srt |
10,264 |
5A0331A3 |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\2.1. Configuring Virtualization-Based Security (VBS) in Windows 10\07.Working with Windows AppLocker.mp4
[6746a215c61835c4]
|
15,596,288 |
5FAF67F4 |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\2.1. Configuring Virtualization-Based Security (VBS) in Windows 10\06.Manage Credential Guard.mp4
[1095b113656b87d7]
|
7,771,436 |
8D7E1E77 |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\2.1. Configuring Virtualization-Based Security (VBS) in Windows 10\04.What is virtualization-based security.en.srt |
7,768 |
7944EA86 |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\7.6. Managing Privileged Access in Azure |
0 |
00000000 |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\Exercise Files |
0 |
00000000 |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\4.3. Implementing Post-breach Defense with Advanced Threat Analytics (ATA) |
0 |
00000000 |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\1.Introduction |
0 |
00000000 |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\8.Conclusion |
0 |
00000000 |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\6.5. Defending Against Advanced Threats with Windows Defender ATP |
0 |
00000000 |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\3.2. Securing Email with Exchange Online Advanced Threat Protection (ATP) |
0 |
00000000 |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\5.4. Protecting Cloud Identities in Azure AD |
0 |
00000000 |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection\2.1. Configuring Virtualization-Based Security (VBS) in Windows 10 |
0 |
00000000 |
Microsoft Cybersecurity Stack - Advanced Identity and Endpoint Protection |
0 |
00000000 |
|
Total size: |
272,865,347 |
|