TorBT - Torrents and Magnet Links Search Engine
    
    Network Security Monitoring (NSM) with Security Onion
- Date: 2022-06-16
- Size: 419 MB
- Files: 33
File Name
                Size
            05._DETECTING_ATTACKS_AT_THE_NE/05_07_MANUAL_TRIAGE.MP4
                60 MB
            02._NETWORK_SECURITY_MONITORING/02_01_INTRODUCTION.MP4
                3.6 MB
            02._NETWORK_SECURITY_MONITORING/02_02_WHY_DO_NSM.MP4
                7.0 MB
            02._NETWORK_SECURITY_MONITORING/02_03_GETTING_STARTED_WITH_.MP4
                9.1 MB
            02._NETWORK_SECURITY_MONITORING/02_04_SECURITY_ONION__A_LIN.MP4
                2.5 MB
            02._NETWORK_SECURITY_MONITORING/02_05_SUMMARY.MP4
                1.8 MB
            03._LOCATION_LOCATION_LOCATION_/03_01_CHOOSING_WHERE_TO_MON.MP4
                12 MB
            04._WHAT_IS_SECURITY_ONION/04_01_MODULE_INTRO.MP4
                2.5 MB
            04._WHAT_IS_SECURITY_ONION/04_02_INSTALLING_SECURITY_O.MP4
                24 MB
            04._WHAT_IS_SECURITY_ONION/04_03_SECURITY_ONION_TOOLS_.MP4
                3.9 MB
            04._WHAT_IS_SECURITY_ONION/04_04_SECURITY_ONION_TOOLS_.MP4
                40 MB
            05._DETECTING_ATTACKS_AT_THE_NE/05_01_MODULE_INTRO.MP4
                3.2 MB
            05._DETECTING_ATTACKS_AT_THE_NE/05_02_SIMULATING_ATTACKS__I.MP4
                8.6 MB
            05._DETECTING_ATTACKS_AT_THE_NE/05_03_SIMULATING_ATTACKS__P.MP4
                11 MB
            05._DETECTING_ATTACKS_AT_THE_NE/05_04_SIMULATING_ATTACKS__B.MP4
                4.8 MB
            05._DETECTING_ATTACKS_AT_THE_NE/05_05_ANALYSIS_AND_TRIAGE_S.MP4
                3.5 MB
            05._DETECTING_ATTACKS_AT_THE_NE/05_06_ALERT_CLASSIFICATION.MP4
                7.4 MB
            01._COURSE_OVERVIEW/01_01_COURSE_OVERVIEW.MP4
                4.4 MB
            05._DETECTING_ATTACKS_AT_THE_NE/05_08_AUTOMATING_AND_TUNING.MP4
                30 MB
            05._DETECTING_ATTACKS_AT_THE_NE/05_09_DISABLING_RULES.MP4
                39 MB
            05._DETECTING_ATTACKS_AT_THE_NE/05_10_WORKING_WITH_THRESHOL.MP4
                14 MB
            05._DETECTING_ATTACKS_AT_THE_NE/05_11_DIGGING_FOR_FILES_SUM.MP4
                31 MB
            05._DETECTING_ATTACKS_AT_THE_NE/05_12_BRO__EXTRACTED_FILES.MP4
                11 MB
            05._DETECTING_ATTACKS_AT_THE_NE/05_13_BRO__LOGS_AND_DASHBOA.MP4
                17 MB
            05._DETECTING_ATTACKS_AT_THE_NE/05_14_MODULE_SUMMARY.MP4
                2.0 MB
            06._OPERATIONALIZING_SECURITY_O/06_01_CONSIDERATIONS_FOR_OP.MP4
                11 MB
            06._OPERATIONALIZING_SECURITY_O/06_02_AUTOMATED_SETUP_AND_I.MP4
                18 MB
            06._OPERATIONALIZING_SECURITY_O/06_03_UPDATING_SOFTWARE__RU.MP4
                20 MB
            06._OPERATIONALIZING_SECURITY_O/06_04_MODULE_SUMMARY.MP4
                2.4 MB
            07._WRAPPING_UP/07_01_NEXT_STEPS.MP4
                3.2 MB
            07._WRAPPING_UP/07_02_TOOLS_SUMMARY.MP4
                5.8 MB
            07._WRAPPING_UP/07_03_COURSE_SUMMARY.MP4
                2.6 MB
            EXERCISE_FILES/SECURITYONIONNETWORKSECURIT.ZIP
                2.5 MB