TorBT - Torrents and Magnet Links Search Engine

Microsoft Cybersecurity Pro Track PowerShell Security

File Name
Size
Course/1. Introduction/3. Preparing the Lab Environment.mp4
91 MB
Course/1. Introduction/2. About the Course.mp4
24 MB
Course/1. Introduction/1. Instructor Introduction.mp4
10 MB
Course/1. Introduction/3. Preparing the Lab Environment.srt
22 kB
Course/1. Introduction/2. About the Course.srt
7.4 kB
Course/1. Introduction/1. Instructor Introduction.srt
2.1 kB
Course/1. Introduction/3.1 S1L3 - Preparing the Lab Environment Documentation.txt
275 B
Course/2. Windows PowerShell Fundamentals/2. PowerShell Editions and Versions.mp4
84 MB
Course/2. Windows PowerShell Fundamentals/1. Windows PowerShell Architecture.mp4
64 MB
Course/2. Windows PowerShell Fundamentals/3. Running Windows Powershell.mp4
51 MB
Course/2. Windows PowerShell Fundamentals/2. PowerShell Editions and Versions.srt
22 kB
Course/2. Windows PowerShell Fundamentals/1. Windows PowerShell Architecture.srt
18 kB
Course/2. Windows PowerShell Fundamentals/3. Running Windows Powershell.srt
13 kB
Course/2. Windows PowerShell Fundamentals/1.1 S2L1 - Windows PowerShell Architecture Documentation.txt
529 B
Course/2. Windows PowerShell Fundamentals/2.1 S2L2 - PowerShell Editions and Versions Documentation.txt
276 B
Course/2. Windows PowerShell Fundamentals/3.1 S2L3 - Running Windows Powershell Documentation.txt
232 B
Course/3. PowerShell Operational Security/2. Managing Remote Execution Capabilities of Windows PowerShell.mp4
184 MB
Course/3. PowerShell Operational Security/1. Managing Local Script Execution Policy with Windows PowerShell Execution.mp4
111 MB
Course/3. PowerShell Operational Security/4. Language Mode.mp4
76 MB
Course/3. PowerShell Operational Security/5. Anti-Malware SCan Interface (AMSI).mp4
37 MB
Course/3. PowerShell Operational Security/3. Constrained Endpoints.mp4
23 MB
Course/3. PowerShell Operational Security/2. Managing Remote Execution Capabilities of Windows PowerShell.srt
42 kB
Course/3. PowerShell Operational Security/1. Managing Local Script Execution Policy with Windows PowerShell Execution.srt
30 kB
Course/3. PowerShell Operational Security/4. Language Mode.srt
23 kB
Course/3. PowerShell Operational Security/5. Anti-Malware SCan Interface (AMSI).srt
7.6 kB
Course/3. PowerShell Operational Security/3. Constrained Endpoints.srt
6.6 kB
Course/3. PowerShell Operational Security/1.1 S3L1 - Managing Local Script Execution Policy with Windows PowerShell Execution Policy Documentation.txt
810 B
Course/3. PowerShell Operational Security/2.1 S3L2 - Managing Remote Execution Capabilities of Windows PowerShell Documentation.txt
591 B
Course/3. PowerShell Operational Security/4.1 S3L4 - Language Mode Documentation.txt
434 B
Course/3. PowerShell Operational Security/3.1 S3L3 - Constrained Endpoints Documentation.txt
179 B
Course/3. PowerShell Operational Security/5.1 S3L5 - Anti-Malware SCan Interface (AMSI) Documentation.txt
149 B
Course/4. Implementing PowerShell-based Security/1. Windows Powershell DSC.mp4
140 MB
Course/4. Implementing PowerShell-based Security/2. Just Enough Administration (JEA).mp4
118 MB
Course/4. Implementing PowerShell-based Security/3. Windows PowerShell Auditing and Logging.mp4
83 MB
Course/4. Implementing PowerShell-based Security/1. Windows Powershell DSC.srt
37 kB
Course/4. Implementing PowerShell-based Security/2. Just Enough Administration (JEA).srt
34 kB
Course/4. Implementing PowerShell-based Security/3. Windows PowerShell Auditing and Logging.srt
17 kB
Course/4. Implementing PowerShell-based Security/3.3 Enable-Script-Block-Logging-Powershell.txt
964 B
Course/4. Implementing PowerShell-based Security/3.2 Enable-System-Wide-Transcription-Powershell.txt
964 B
Course/4. Implementing PowerShell-based Security/3.1 Protected-Event-Logging-Powershell.txt
642 B
Course/4. Implementing PowerShell-based Security/2.1 S4L2 - Just Enough Administration (JEA) Documentation.txt
592 B
Course/4. Implementing PowerShell-based Security/1.1 S4L1 - Windows Powershell DSC Documentation.txt
500 B
Course/4. Implementing PowerShell-based Security/3.4 S4L3 - Windows PowerShell Auditing and Logging Documentation.txt
147 B
Course/5. Windows PowerShell-based Exploits and their Mitigation/1. Windows PowerShell-based Attacks.mp4
128 MB
Course/5. Windows PowerShell-based Exploits and their Mitigation/3. Summary of Windows PowerShell-based Security-Related Technologies.mp4
53 MB
Course/5. Windows PowerShell-based Exploits and their Mitigation/2. Windows PowerShell-based Security Tools.mp4
48 MB
Course/5. Windows PowerShell-based Exploits and their Mitigation/1. Windows PowerShell-based Attacks.srt
34 kB
Course/5. Windows PowerShell-based Exploits and their Mitigation/3. Summary of Windows PowerShell-based Security-Related Technologies.srt
12 kB
Course/5. Windows PowerShell-based Exploits and their Mitigation/2. Windows PowerShell-based Security Tools.srt
8.5 kB
Course/5. Windows PowerShell-based Exploits and their Mitigation/1.1 S5L1 - Windows PowerShell-based Attacks Documentation.txt
752 B
Course/5. Windows PowerShell-based Exploits and their Mitigation/2.1 S5L2 - Windows PowerShell-based Security Tools.txt
173 B
Course/6. Final Exam/1. Final Exam.html
164 B
Course/7. Hands-On Lab/1. Hands-On Lab.html
168 B
[TGx]Downloaded from torrentgalaxy.to .txt
642 B
[UdemyLibrary.com] Join for free courses and tutorials.txt
265 B
Torrent downloaded from Demonoid.is.txt
112 B
Torrent downloaded from ettvcentral.com.txt
110 B
Torrent downloaded from 1337x.to.txt
100 B