TorBT - Torrents and Magnet Links Search Engine
[ DevCourseWeb.com ] Udemy - Misconfigurations Defense for Red and Blue Teams
- Date: 2026-04-22
- Size: 2.6 GB
- Files: 57
File Name
Size
Get Bonus Downloads Here.url
182 B
~Get Your Files Here !/1. SECTION 1/1. Introduction.mp4
59 MB
~Get Your Files Here !/1. SECTION 1/10. Misconfiguration #6.mp4
36 MB
~Get Your Files Here !/1. SECTION 1/11. Misconfiguration #7.mp4
47 MB
~Get Your Files Here !/1. SECTION 1/12. Misconfiguration #8.mp4
68 MB
~Get Your Files Here !/1. SECTION 1/13. Misconfiguration #9.mp4
32 MB
~Get Your Files Here !/1. SECTION 1/14. Misconfiguration #10.mp4
47 MB
~Get Your Files Here !/1. SECTION 1/15. End of Section 1 Quiz.mp4
25 MB
~Get Your Files Here !/1. SECTION 1/2. Course Agenda.mp4.mp4
44 MB
~Get Your Files Here !/1. SECTION 1/3. Intro to Systemic weaknesses in relation to cybersecurity misconfigurations.mp4
83 MB
~Get Your Files Here !/1. SECTION 1/4. Intro to the top 10 NSA & CISA Misconfigurations.mp4
21 MB
~Get Your Files Here !/1. SECTION 1/5. Misconfiguration #1.mp4
100 MB
~Get Your Files Here !/1. SECTION 1/6. Misconfiguration #2.mp4
95 MB
~Get Your Files Here !/1. SECTION 1/7. Misconfiguration #3.mp4
78 MB
~Get Your Files Here !/1. SECTION 1/8. Misconfiguration #4.mp4
48 MB
~Get Your Files Here !/1. SECTION 1/9. Misconfiguration #5.mp4
58 MB
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/1. An Intro to MITRE ATT&CK Framework.mp4
36 MB
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/10. Mitigate-Poor credential hygiene.mp4
66 MB
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/11. Mitigate- Unrestricted code execution.mp4
68 MB
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/12. Validating Security Controls.mp4
55 MB
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/13. Open-Source Tools for Testing Active Directory Misconfigurations.mp4
66 MB
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/14. Intro to Open-Source Tools for addressing the top 10 misconfigurations.mp4
14 MB
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/15. Open-Source Tools for Preventing Insufficient Access Control Lists (ACLs) on Net.mp4
63 MB
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/16. Open-Source Tools for Preventing Lack of Network Segmentation.mp4
51 MB
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/17. Open-Source Tools for Preventing Insufficient Internal Network Monitoring.mp4
51 MB
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/18. Establishing security baselines to help with mitigating misconfigurations.mp4
37 MB
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/19. Lab#1- Creating Security Baselines In Azure.mp4
56 MB
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/2. Mitigate-Default configurations of software and applications.mp4
79 MB
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/20. Lab#2- PenTest Azure Deployments Misconfigurations using ChatGPT.mp4
100 MB
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/21. Lab#3- PenTest Azure Deployments Misconfigurations using ChatGPT.mp4
60 MB
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/22. Lab#4-Misconfigurations Research Defense Challenge.mp4
32 MB
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/3. Mitigate-Improper separation of useradministrator privilege.mp4
76 MB
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/4. Mitigate-Insufficient internal network monitoring.mp4
79 MB
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/5. Mitigate-Lack of network segmentation.mp4
55 MB
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/6. Mitigate-Poor patch management.mp4
33 MB
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/7. Mitigate-Bypass of system access controls.mp4
59 MB
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/8. Mitigate-Weak or misconfigured multifactor authentication (MFA) methods.mp4
52 MB
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/9. Mitigate-Insufficient access control lists (ACLs) on network shares and services.mp4
68 MB
~Get Your Files Here !/3. SECTION 3-Putting everything into perspective/1. Introduction to Section 3.mp4
17 MB
~Get Your Files Here !/3. SECTION 3-Putting everything into perspective/10. Case Scenario- Applying Misconfigurations Checklist to a Data Breach Incident.mp4
115 MB
~Get Your Files Here !/3. SECTION 3-Putting everything into perspective/11. Improving Hardening of environment against these misconfigurations.mp4
129 MB
~Get Your Files Here !/3. SECTION 3-Putting everything into perspective/12. Prevent cloud security misconfigurations via Azure Red Team Pen Testing.mp4
66 MB
~Get Your Files Here !/3. SECTION 3-Putting everything into perspective/13. End of Course.mp4
14 MB
~Get Your Files Here !/3. SECTION 3-Putting everything into perspective/2. Intro to Root Cause Analysis (RCA).mp4
23 MB
~Get Your Files Here !/3. SECTION 3-Putting everything into perspective/3. Benefits of RCA for both Red and Blue Teamers.mp4
37 MB
~Get Your Files Here !/3. SECTION 3-Putting everything into perspective/4. Steps for conducting RCA.mp4
78 MB
~Get Your Files Here !/3. SECTION 3-Putting everything into perspective/5. Quiz#2.mp4
9.6 MB
~Get Your Files Here !/3. SECTION 3-Putting everything into perspective/6. Intro to creating misconfigurations mitigation checklists using AI.mp4
17 MB
~Get Your Files Here !/3. SECTION 3-Putting everything into perspective/7. Creating a misconfiguration prevention checklist.mp4
59 MB
~Get Your Files Here !/3. SECTION 3-Putting everything into perspective/8. Creating a misconfiguration checklist that prevents bypass of system access cont.mp4
34 MB
~Get Your Files Here !/3. SECTION 3-Putting everything into perspective/9. Challenge-Create Your own misconfigurations checklist.mp4
8.8 MB
~Get Your Files Here !/4. Course Resources/1. Bonus Lecture.html
2.2 kB
~Get Your Files Here !/4. Course Resources/1.1 Case Scenario-The Breach of Acme Inc.pdf
198 kB
~Get Your Files Here !/4. Course Resources/1.2 JOINT_CSA_TOP_TEN_MISCONFIGURATIONS_TLP-CLEAR.PDF
1.1 MB
~Get Your Files Here !/4. Course Resources/1.3 Links to websites.txt
959 B
~Get Your Files Here !/4. Course Resources/1.4 Steps Involved in Root Cause Analysis.pdf
204 kB
~Get Your Files Here !/Bonus Resources.txt
386 B