
2. Table of Contents 1.mp4 - 55.3 MB

14. NIST SP 800137 Automation Domains.mp4 - 18.4 MB

1. Automation and Continuous Security Monitoring.mp4 - 17.7 MB

10. Department of Homeland Securitys CDM.mp4 - 11.2 MB

8. DoD Risk Management Framework.mp4 - 10.4 MB

9. Bejtlich on RMF.mp4 - 7.39 MB

16. Spotting the Adversary with Windows Event Log Monitoring Version 2.mp4 - 3.72 MB

5. What Is Continuous Security Monitoring.mp4 - 3.27 MB

6. Acronym Soup.mp4 - 2.97 MB

17. The US Governments Take on CSM Lessons Learned.mp4 - 2.85 MB

18. Our Approach to CSM.mp4 - 1.49 MB

13. NIST Special Publication 800137.mp4 - 1.09 MB

7. The US Government and Continuous Monitoring.mp4 - 1.05 MB

12. NIST SP 800137.mp4 - 834 kB

11. Bejtlich on CDM.mp4 - 726 kB

15. NIST SP 800137 What to Do Not How to Do It.mp4 - 625 kB

4. Course Roadmap.mp4 - 136 kB

3. Table of Contents 2.mp4 - 80.8 kB

16. Lets Try Long Tail Analysis on Windows Security Logs.mp4 - 53.3 MB

15. The Long Tail 1.mp4 - 19.4 MB

3. Monitoring a NonDefensible Network.mp4 - 12.2 MB

9. Windows Data Classification Tools.mp4 - 9.89 MB

4. Focus on Critical Systems and Data.mp4 - 7.4 MB

12. The Broken Windows Theory.mp4 - 6.79 MB

7. High Data in All the Wrong Places.mp4 - 5.92 MB

11. Solve Problems as They Are Discovered.mp4 - 3.95 MB

6. Data Classification HowTo.mp4 - 3.47 MB

14. Key CSM Technique Long Tail Analysis.mp4 - 2.5 MB

13. Broken Windows Theory of Defensible Networks.mp4 - 2.36 MB

8. Protect High Data.mp4 - 2.23 MB

5. FIPS 199 on SBU Classification.mp4 - 1.11 MB

10. Detecting Change.mp4 - 938 kB

1. Course Roadmap.mp4 - 576 kB

2. Winning CSM Techniques.mp4 - 446 kB

17. The Long Tail 2.mp4 - 74.1 kB

43. SEC511 Workbook Windows Event Logs.mp4 - 40.3 MB

10. Local View Meterpreter Payload.mp4 - 10.7 MB

31. Critical Event 9 Detecting Lateral Movement.mp4 - 10.5 MB

35. Attacker View Metasploit PsExec PasstheHash 1.mp4 - 8.85 MB

37. Didnt Microsoft Fix This.mp4 - 8.21 MB

33. Track the Use of Local Credentials via the Network.mp4 - 7.88 MB

13. Attacker Uses Metasploit PsExec Exploit.mp4 - 7.14 MB

2. Monitoring Critical Windows Events.mp4 - 7.11 MB

3. Windows Event Log Locations.mp4 - 5.62 MB

7. Critical Windows Event to Monitor.mp4 - 5.07 MB

23. Critical Event 5 Clearing Event Logs.mp4 - 4.91 MB

15. System Event ID 7045 Sysinternals versus Metasploit PsExec.mp4 - 4.11 MB

9. Critical Event 1 CommandLine Auditing.mp4 - 4.02 MB

4. Damaged Windows Event Logs.mp4 - 3.66 MB

26. Critical Event 7 External Media Detection.mp4 - 3.22 MB

32. Use of Local versus Domain Credentials.mp4 - 3.01 MB

18. Critical Event 3 User Creation.mp4 - 2.96 MB

25. Event Viewer System Log View.mp4 - 2.94 MB

28. Critical Event 8 Disabling the Firewall.mp4 - 2.94 MB

27. Event Viewer System Log View New USB Drive.mp4 - 2.55 MB

20. Critical Event 4 Adding Users to Privileged Groups.mp4 - 2.55 MB

30. Adding Specific Firewall Rules.mp4 - 2.36 MB

24. Critical Event 6 Terminal Services Certificate Creation.mp4 - 2.28 MB

19. Event Viewer Security Log View net user sec511 sekrit add.mp4 - 2.09 MB

12. Event IDs 7045 and 4697 normal Service Creation.mp4 - 2.04 MB

29. Event Viewer View Disabling the Firewall.mp4 - 1.93 MB

38. PasstheHash and Lateral Movement Mitigation.mp4 - 1.92 MB

41. Summary Critical Windows Events to Monitor.mp4 - 1.73 MB

16. System Event ID 7030 Track Errors.mp4 - 1.69 MB

34. PasstheHash Detection.mp4 - 1.69 MB

5. Viewing Windows Security Event Logs.mp4 - 1.65 MB

11. Critical Event 2 Service Creation.mp4 - 1.46 MB

39. Critical Event 10 AppLocker Alerts.mp4 - 1.42 MB

17. A Word on Scripting and Automation.mp4 - 1.42 MB

6. Exporting Event Logs.mp4 - 1.4 MB

14. How Does This Differ from Normal PsExec.mp4 - 1.26 MB

40. Critical Event 11 EMET Alerts.mp4 - 1.24 MB

8. Detecting Malice via Windows Events.mp4 - 1.19 MB

42. Course Roadmap 2.mp4 - 1.12 MB

22. Tracking Changes to Domain Groups.mp4 - 1.05 MB

21. Event Viewer Security Log View net localgroup administrators sec511 add.mp4 - 793 kB

36. Attacker View Metasploit PsExec PasstheHash 2.mp4 - 782 kB

1. Course Roadmap 1.mp4 - 474 kB

10. SEC511 Workbook p0f v3.mp4 - 32.5 MB

2. Passive Host Discovery.mp4 - 12.2 MB

4. p0f version 3.mp4 - 6.58 MB

1. Course Roadmap 1.mp4 - 6.34 MB

3. Passive Scanning.mp4 - 4.79 MB

5. PRADS.mp4 - 3.81 MB

8. CleanedUp Output.mp4 - 1.66 MB

6. Raw PRADS Log View in Gnumeric Spreadsheet.mp4 - 826 kB

7. Lets Clean That Up a Bit.mp4 - 466 kB

9. Course Roadmap 2.mp4 - 122 kB

13. SEC511 Workbook Inventory.mp4 - 29.1 MB

9. Always Test.mp4 - 10.7 MB

11. Ndiff.mp4 - 2.75 MB

5. Inventories.mp4 - 2.31 MB

3. Cant Secure What You Dont Have or Dont Know You Have.mp4 - 2.03 MB

7. Host Port and Service Discovery.mp4 - 1.91 MB

6. Asset Inventory.mp4 - 1.76 MB

2. Know Thy Software.mp4 - 1.72 MB

10. Nmap.mp4 - 1.32 MB

1. Course Roadmap 1.mp4 - 1.18 MB

8. Active Scanning.mp4 - 766 kB

4. Inventory and Control of Hardware Assets.mp4 - 487 kB

12. Course Roadmap 2.mp4 - 139 kB

10. ASD Mitigation Strategies to Detect and Respond.mp4 - 15.4 MB

5. Top 4 Mitigation Strategies.mp4 - 10.5 MB

6. ASD Essential Eight Prevent Malware Delivery and Execution.mp4 - 8.92 MB

2. Industry Best Practices.mp4 - 4.2 MB

3. CIS Controls.mp4 - 3.35 MB

8. ASD Essential Eight Recover Data and System Availability.mp4 - 2.46 MB

9. The ASD Top 4 Focus on Prevention.mp4 - 2.31 MB

4. ASD Strategies to Mitigate Cyber Security Incidents.mp4 - 2.27 MB

7. ASD Essential Eight Limit Extent of Incidents.mp4 - 737 kB

1. Course Roadmap.mp4 - 589 kB

11. Bots Love Spam.mp4 - 12.1 MB

6. Behavioral Proxy Checks.mp4 - 3.93 MB

5. Proxies Rule.mp4 - 3.1 MB

12. Which Outbound Ports to BlockLogAlert.mp4 - 2.34 MB

7. Case Study Naked Downloads.mp4 - 2.34 MB

9. Leveraging Firewall Logs.mp4 - 2.16 MB

8. Proxies Allow Easy Detection of C2.mp4 - 2.16 MB

4. Mandatory Proxies.mp4 - 1.92 MB

10. CIS 6 Audit Logs.mp4 - 1.77 MB

2. Leveraging Proxy and Firewall Data.mp4 - 1.75 MB

1. Course Roadmap.mp4 - 789 kB

3. CIS 129 Boundary Defense.mp4 - 660 kB

9. Now Were Logging DNS Whats Next.mp4 - 10.9 MB

6. DNS Analytical Logging on Windows 2012R2.mp4 - 7.6 MB

2. Monitoring Service Logs.mp4 - 7.51 MB

12. FirefoxDoH.mp4 - 5.73 MB

13. ChromeDoH.mp4 - 4.28 MB

5. Enable DNS Query Logging on Windows 20082012.mp4 - 3.39 MB

4. Check Your DNS.mp4 - 3.18 MB

8. Enable Response Logging on Bind 9.mp4 - 2.09 MB

11. DoH and DoT.mp4 - 1.83 MB

10. DNS over HTTPS DoH and DNS over TLS DoT.mp4 - 1.61 MB

3. CIS 87 Malware Defenses.mp4 - 1.16 MB

1. Course Roadmap.mp4 - 617 kB

7. Enable Query Logging on Bind 9.mp4 - 496 kB

17. Test PowerShell Command.mp4 - 7.17 MB

10. DeepBlueCLI.mp4 - 6.41 MB

8. Next Step Long Tail Analysis.mp4 - 4.28 MB

16. Use Case SamSam Spreading via WMI and PsExec.mp4 - 2.67 MB

5. Windows Registry Startup Keys.mp4 - 2.66 MB

2. Importance of Automation.mp4 - 2.65 MB

1. Course Roadmap.mp4 - 2.59 MB

11. DeepBlueCLI Partial List of Detected Events.mp4 - 2.55 MB

7. Example PowerShell Script.mp4 - 2.41 MB

18. Use Case DeepBlueCLI vs PowerShell via WMIC and PsExec.mp4 - 2.34 MB

3. Automation Example Windows Startup Registry Keys.mp4 - 1.75 MB

12. DeepBlueCLI Regex Matching Command Lines.mp4 - 1.73 MB

13. DeepBlueCLI Whitelist.mp4 - 1.7 MB

15. Use Case Petya.mp4 - 1.36 MB

14. DeepBlue CLI Base64 andor Compressed Commands.mp4 - 1.22 MB

4. What Does a Malicious Startup Registry Key Look Like.mp4 - 1.21 MB

9. Then Automate.mp4 - 1.11 MB

6. Remotely Accessing Registry Keys.mp4 - 876 kB

6. Quick and Dirty Linux Patch Checks.mp4 - 5.09 MB

5. Linux Patch Compliance.mp4 - 4.45 MB

3. Standalone Microsoft Patch Scanning.mp4 - 3.58 MB

1. Course Roadmap.mp4 - 2.68 MB

4. GetMissingUpdates.mp4 - 2.39 MB

2. Monitoring Patching.mp4 - 909 kB

1. Appendix Centralize Windows Event Logs MBSA.mp4 - 141 kB

7. Add Computers to Groups.mp4 - 117 kB

4. Configuring Centralized Logging 1.mp4 - 117 kB

6. Create Two Groups.mp4 - 114 kB

3. Collectors and Sources.mp4 - 113 kB

2. Configuring Centralized Windows Event Log Collection.mp4 - 107 kB

5. Configuring Centralized Logging 2.mp4 - 104 kB

12. Complete Subscription.mp4 - 95.4 kB

8. Windows Remote Management.mp4 - 93.9 kB

9. Enable the Windows Event Collector.mp4 - 93.7 kB

13. Default Windows Vista and Newer Settings.mp4 - 88 kB

10. Creating the Subscription in Event Viewer.mp4 - 84 kB

11. Choose Events.mp4 - 77.7 kB