"People must know the past to understand the present and face the future." ―Nellie McClung"
  • U: Anonymous
  • D: 2018-01-22 04:49:10
  • C: Unknown

RELEASE >

ReScene version pyReScene Auto 0.6 XQZT File size CRC
Download
16,125
Stored files
1,635 D6D8EF74
192 180A542E
RAR-files
lmcssei-7bda-xqzt.rar 50,000,000 B81D8AFD
lmcssei-7bda-xqzt.r00 50,000,000 04C35D77
lmcssei-7bda-xqzt.r01 50,000,000 A1D7D52A
lmcssei-7bda-xqzt.r02 50,000,000 B8E89159
lmcssei-7bda-xqzt.r03 50,000,000 9554D263
lmcssei-7bda-xqzt.r04 40,811,688 DF15019D

Total size: 290,811,688
Archived files
Microsoft Cybersecurity Stack - Securing Enterprise Information\Exercise Files\Ex_Files_Microsoft_Cybersecurity_Stack_SEI.zip 4,615 FD55269D
Microsoft Cybersecurity Stack - Securing Enterprise Information\1.Introduction\03.Lab requirements.mp4 [a6c41bf891c19bcd] 1,188,090 D5CBC693
Microsoft Cybersecurity Stack - Securing Enterprise Information\1.Introduction\01.Welcome.en.srt 2,271 66059483
Microsoft Cybersecurity Stack - Securing Enterprise Information\1.Introduction\02.What you should know.mp4 [94bfc92dbda3f613] 773,538 D389E9FB
Microsoft Cybersecurity Stack - Securing Enterprise Information\1.Introduction\03.Lab requirements.en.srt 937 4228B986
Microsoft Cybersecurity Stack - Securing Enterprise Information\1.Introduction\02.What you should know.en.srt 571 A18653AD
Microsoft Cybersecurity Stack - Securing Enterprise Information\1.Introduction\01.Welcome.mp4 [13e4f6db333203aa] 4,706,149 084FADED
Microsoft Cybersecurity Stack - Securing Enterprise Information\7.Conclusion\28.Next steps.mp4 [ed5c476d93013bb] 2,651,998 B6ABC42D
Microsoft Cybersecurity Stack - Securing Enterprise Information\7.Conclusion\28.Next steps.en.srt 1,481 AE61B4FE
Microsoft Cybersecurity Stack - Securing Enterprise Information\5.4. Securing Collaboration and DLP\20.Using SharePoint security policies.en.srt 6,439 2B335EC7
Microsoft Cybersecurity Stack - Securing Enterprise Information\5.4. Securing Collaboration and DLP\21.Audit sharing activity in SharePoint.mp4 [33bb0d8c7134bc74] 8,040,054 16B01C18
Microsoft Cybersecurity Stack - Securing Enterprise Information\5.4. Securing Collaboration and DLP\20.Using SharePoint security policies.mp4 [6854864c87ac3aaa] 9,558,572 126661C3
Microsoft Cybersecurity Stack - Securing Enterprise Information\5.4. Securing Collaboration and DLP\19.Configure built-in IRM options.mp4 [4b193fe0b5d1a5dc] 20,093,860 17441343
Microsoft Cybersecurity Stack - Securing Enterprise Information\5.4. Securing Collaboration and DLP\18.Information Rights Management (IRM) in SharePoint.mp4 [87e51e34979c3965] 7,046,171 F0656D2F
Microsoft Cybersecurity Stack - Securing Enterprise Information\5.4. Securing Collaboration and DLP\22.Secure email sharing with anyone, anywhere.mp4 [b5c8353a33970e4b] 11,788,855 856D56B4
Microsoft Cybersecurity Stack - Securing Enterprise Information\5.4. Securing Collaboration and DLP\22.Secure email sharing with anyone, anywhere.en.srt 7,435 EDE2EE8F
Microsoft Cybersecurity Stack - Securing Enterprise Information\5.4. Securing Collaboration and DLP\18.Information Rights Management (IRM) in SharePoint.en.srt 4,289 EDD128CE
Microsoft Cybersecurity Stack - Securing Enterprise Information\5.4. Securing Collaboration and DLP\21.Audit sharing activity in SharePoint.en.srt 5,293 B5AC24A1
Microsoft Cybersecurity Stack - Securing Enterprise Information\5.4. Securing Collaboration and DLP\19.Configure built-in IRM options.en.srt 10,816 06E4477A
Microsoft Cybersecurity Stack - Securing Enterprise Information\3.2. Securing Corporate Data on Mobile Devices\10.Data loss prevention (DLP) on mobile devices.en.srt 9,170 97058969
Microsoft Cybersecurity Stack - Securing Enterprise Information\3.2. Securing Corporate Data on Mobile Devices\12.Implement DLP for unmanaged mobile devices.mp4 [d34410a8415de255] 14,488,871 F1EDB91C
Microsoft Cybersecurity Stack - Securing Enterprise Information\3.2. Securing Corporate Data on Mobile Devices\11.Secure sharing from mobile devices.en.srt 2,706 FBBE2D21
Microsoft Cybersecurity Stack - Securing Enterprise Information\3.2. Securing Corporate Data on Mobile Devices\10.Data loss prevention (DLP) on mobile devices.mp4 [b7130dfca28699c1] 14,997,263 E90019A3
Microsoft Cybersecurity Stack - Securing Enterprise Information\3.2. Securing Corporate Data on Mobile Devices\09.Challenges of securing data on mobile devices.en.srt 5,416 CC37B59E
Microsoft Cybersecurity Stack - Securing Enterprise Information\3.2. Securing Corporate Data on Mobile Devices\12.Implement DLP for unmanaged mobile devices.en.srt 10,045 DBB201C5
Microsoft Cybersecurity Stack - Securing Enterprise Information\3.2. Securing Corporate Data on Mobile Devices\11.Secure sharing from mobile devices.mp4 [5f885e85b6c674c7] 4,413,007 531DB49D
Microsoft Cybersecurity Stack - Securing Enterprise Information\3.2. Securing Corporate Data on Mobile Devices\09.Challenges of securing data on mobile devices.mp4 [a7c851ac9eb5dc0b] 8,837,604 01E3628A
Microsoft Cybersecurity Stack - Securing Enterprise Information\2.1. Securing Corporate Information on Any Device\07.Work with the AIP client.en.srt 11,947 40814A3B
Microsoft Cybersecurity Stack - Securing Enterprise Information\2.1. Securing Corporate Information on Any Device\07.Work with the AIP client.mp4 [fd8dc651037db0a2] 17,481,786 82C891E8
Microsoft Cybersecurity Stack - Securing Enterprise Information\2.1. Securing Corporate Information on Any Device\05.Configure classification and labeling.en.srt 9,145 ECA1DE50
Microsoft Cybersecurity Stack - Securing Enterprise Information\2.1. Securing Corporate Information on Any Device\04.What is Azure Information Protection (AIP).en.srt 8,413 89B82476
Microsoft Cybersecurity Stack - Securing Enterprise Information\2.1. Securing Corporate Information on Any Device\06.Create RMS templates.en.srt 12,126 50DB7405
Microsoft Cybersecurity Stack - Securing Enterprise Information\2.1. Securing Corporate Information on Any Device\04.What is Azure Information Protection (AIP).mp4 [ca315e4a45a7ae1e] 12,617,779 44A11D61
Microsoft Cybersecurity Stack - Securing Enterprise Information\2.1. Securing Corporate Information on Any Device\08.Classify and protect data in bulk.mp4 [20a58412cdb28aa0] 6,207,627 DA7015FC
Microsoft Cybersecurity Stack - Securing Enterprise Information\2.1. Securing Corporate Information on Any Device\06.Create RMS templates.mp4 [dab83087b282fed1] 18,990,382 8763C43C
Microsoft Cybersecurity Stack - Securing Enterprise Information\2.1. Securing Corporate Information on Any Device\08.Classify and protect data in bulk.en.srt 4,336 8573E28E
Microsoft Cybersecurity Stack - Securing Enterprise Information\2.1. Securing Corporate Information on Any Device\05.Configure classification and labeling.mp4 [679f6929f85efbeb] 13,657,143 A12425FC
Microsoft Cybersecurity Stack - Securing Enterprise Information\6.5. Securing Structured (SQL) Data\24.What is SQL 'Always Encrypted'.en.srt 8,646 3CC8CB40
Microsoft Cybersecurity Stack - Securing Enterprise Information\6.5. Securing Structured (SQL) Data\23.Secure structured data at rest.mp4 [6d5c4490c90bb843] 13,589,559 CF9BF6B0
Microsoft Cybersecurity Stack - Securing Enterprise Information\6.5. Securing Structured (SQL) Data\27.Protect Azure SQL with SQL Threat Detection.en.srt 5,626 47BB4914
Microsoft Cybersecurity Stack - Securing Enterprise Information\6.5. Securing Structured (SQL) Data\25.Using row-level security.mp4 [c462a758064f6c18] 15,063,471 BB78733C
Microsoft Cybersecurity Stack - Securing Enterprise Information\6.5. Securing Structured (SQL) Data\24.What is SQL 'Always Encrypted'.mp4 [56a287486130d8be] 12,549,603 D5A1EE06
Microsoft Cybersecurity Stack - Securing Enterprise Information\6.5. Securing Structured (SQL) Data\26.Configure dynamic data masking.en.srt 4,572 6D8F81AA
Microsoft Cybersecurity Stack - Securing Enterprise Information\6.5. Securing Structured (SQL) Data\26.Configure dynamic data masking.mp4 [3ad35fe680c63257] 9,325,536 75B4E2CD
Microsoft Cybersecurity Stack - Securing Enterprise Information\6.5. Securing Structured (SQL) Data\25.Using row-level security.en.srt 7,296 19AA2061
Microsoft Cybersecurity Stack - Securing Enterprise Information\6.5. Securing Structured (SQL) Data\23.Secure structured data at rest.en.srt 8,408 662F3728
Microsoft Cybersecurity Stack - Securing Enterprise Information\6.5. Securing Structured (SQL) Data\27.Protect Azure SQL with SQL Threat Detection.mp4 [1e0cd1f71a39ed7a] 7,825,106 230A1B94
Microsoft Cybersecurity Stack - Securing Enterprise Information\4.3. Identifying and Controlling Shadow IT\16.Configure automatic log upload.mp4 [df6b4acad5cd3d34] 10,505,686 808ED203
Microsoft Cybersecurity Stack - Securing Enterprise Information\4.3. Identifying and Controlling Shadow IT\16.Configure automatic log upload.en.srt 6,195 EB2A48F9
Microsoft Cybersecurity Stack - Securing Enterprise Information\4.3. Identifying and Controlling Shadow IT\13.What is Cloud App Security (CAS).mp4 [45b3c7be5ee4a050] 13,846,982 E76CC485
Microsoft Cybersecurity Stack - Securing Enterprise Information\4.3. Identifying and Controlling Shadow IT\13.What is Cloud App Security (CAS).en.srt 8,127 30E85F0A
Microsoft Cybersecurity Stack - Securing Enterprise Information\4.3. Identifying and Controlling Shadow IT\15.Customize discovery and anonymize discovery data.en.srt 4,691 03842D00
Microsoft Cybersecurity Stack - Securing Enterprise Information\4.3. Identifying and Controlling Shadow IT\14.Deploy Cloud Discovery.mp4 [ff34a3c15fe3d0e4] 9,851,275 786F4C89
Microsoft Cybersecurity Stack - Securing Enterprise Information\4.3. Identifying and Controlling Shadow IT\15.Customize discovery and anonymize discovery data.mp4 [b19aaefb6c2ae5c3] 7,607,599 31172F5C
Microsoft Cybersecurity Stack - Securing Enterprise Information\4.3. Identifying and Controlling Shadow IT\17.Connect apps to CAS.en.srt 7,262 953199BB
Microsoft Cybersecurity Stack - Securing Enterprise Information\4.3. Identifying and Controlling Shadow IT\17.Connect apps to CAS.mp4 [b667136c3e64d881] 12,911,411 013DDD13
Microsoft Cybersecurity Stack - Securing Enterprise Information\4.3. Identifying and Controlling Shadow IT\14.Deploy Cloud Discovery.en.srt 6,183 B83B4501
Microsoft Cybersecurity Stack - Securing Enterprise Information\Exercise Files 0 00000000
Microsoft Cybersecurity Stack - Securing Enterprise Information\1.Introduction 0 00000000
Microsoft Cybersecurity Stack - Securing Enterprise Information\7.Conclusion 0 00000000
Microsoft Cybersecurity Stack - Securing Enterprise Information\5.4. Securing Collaboration and DLP 0 00000000
Microsoft Cybersecurity Stack - Securing Enterprise Information\3.2. Securing Corporate Data on Mobile Devices 0 00000000
Microsoft Cybersecurity Stack - Securing Enterprise Information\2.1. Securing Corporate Information on Any Device 0 00000000
Microsoft Cybersecurity Stack - Securing Enterprise Information\6.5. Securing Structured (SQL) Data 0 00000000
Microsoft Cybersecurity Stack - Securing Enterprise Information\4.3. Identifying and Controlling Shadow IT 0 00000000
Microsoft Cybersecurity Stack - Securing Enterprise Information 0 00000000

Total size: 290,799,434
RAR Recovery
Not Present
Labels UNKNOWN