TorBT - Torrents and Magnet Links Search Engine

SANS505 PowerShell 2017

File Name
Size
Section 3 Windows PKI and Smart Cards/3.2 PKI Overview, Benefits and Tools/SANS OnDemand_6.WEBM
146 MB
SEC505.1 PowerShell Automation and Security.pdf
88 MB
SEC505.2 Continuous Secure Configuration Enforcement.pdf
86 MB
SEC505.3 Windows PKI and Smart Cards.pdf
71 MB
SEC505.4 Administrative Compromise and Privilege Management.pdf
84 MB
SEC505.5 Endpoint Protection and Pre-Forensics.pdf
73 MB
SEC505.6 Defensible Networking and Blue Team WMI.pdf
79 MB
Section 1 PowerShell Automation and Security/1.1 Introduction PowerShell Automation and Security/SANS OnDemand.WEBM
2.9 MB
Section 1 PowerShell Automation and Security/1.1 Introduction PowerShell Automation and Security/SANS OnDemand_2.WEBM
39 MB
Section 1 PowerShell Automation and Security/1.2 PowerShell Overview and Tips/1.WEBM
504 kB
Section 1 PowerShell Automation and Security/1.2 PowerShell Overview and Tips/10.WEBM
22 MB
Section 1 PowerShell Automation and Security/1.2 PowerShell Overview and Tips/11.WEBM
9.4 MB
Section 1 PowerShell Automation and Security/1.2 PowerShell Overview and Tips/12.WEBM
12 MB
Section 1 PowerShell Automation and Security/1.2 PowerShell Overview and Tips/13.WEBM
26 MB
Section 1 PowerShell Automation and Security/1.2 PowerShell Overview and Tips/14.WEBM
28 MB
Section 1 PowerShell Automation and Security/1.2 PowerShell Overview and Tips/2.WEBM
37 MB
Section 1 PowerShell Automation and Security/1.2 PowerShell Overview and Tips/3.WEBM
116 kB
Section 1 PowerShell Automation and Security/1.2 PowerShell Overview and Tips/4.WEBM
94 kB
Section 1 PowerShell Automation and Security/1.2 PowerShell Overview and Tips/5.WEBM
19 MB
Section 1 PowerShell Automation and Security/1.2 PowerShell Overview and Tips/6.WEBM
50 MB
Section 1 PowerShell Automation and Security/1.2 PowerShell Overview and Tips/7.WEBM
29 MB
Section 1 PowerShell Automation and Security/1.2 PowerShell Overview and Tips/8.WEBM
3.3 MB
Section 1 PowerShell Automation and Security/1.2 PowerShell Overview and Tips/9.WEBM
27 MB
Section 1 PowerShell Automation and Security/1.3 Modules, Functions and PowerShell Remoting/SANS OnDemand.WEBM
80 kB
Section 1 PowerShell Automation and Security/1.3 Modules, Functions and PowerShell Remoting/SANS OnDemand_10.WEBM
24 MB
Section 1 PowerShell Automation and Security/1.3 Modules, Functions and PowerShell Remoting/SANS OnDemand_11.WEBM
7.4 MB
Section 1 PowerShell Automation and Security/1.3 Modules, Functions and PowerShell Remoting/SANS OnDemand_2.WEBM
24 MB
Section 1 PowerShell Automation and Security/1.3 Modules, Functions and PowerShell Remoting/SANS OnDemand_3.WEBM
36 MB
Section 1 PowerShell Automation and Security/1.3 Modules, Functions and PowerShell Remoting/SANS OnDemand_4.WEBM
9.6 MB
Section 1 PowerShell Automation and Security/1.3 Modules, Functions and PowerShell Remoting/SANS OnDemand_5.WEBM
20 MB
Section 1 PowerShell Automation and Security/1.3 Modules, Functions and PowerShell Remoting/SANS OnDemand_6.WEBM
5.1 MB
Section 1 PowerShell Automation and Security/1.3 Modules, Functions and PowerShell Remoting/SANS OnDemand_7.WEBM
6.0 MB
Section 1 PowerShell Automation and Security/1.3 Modules, Functions and PowerShell Remoting/SANS OnDemand_8.WEBM
3.0 MB
Section 1 PowerShell Automation and Security/1.3 Modules, Functions and PowerShell Remoting/SANS OnDemand_9.WEBM
19 MB
Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_12.WEBM
1.7 MB
Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_13.WEBM
23 MB
Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_14.WEBM
7.3 MB
Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_15.WEBM
19 MB
Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_16.WEBM
16 MB
Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_17.WEBM
8.5 MB
Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_18.WEBM
8.6 MB
Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_19.WEBM
471 kB
Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_20.WEBM
5.3 MB
Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_21.WEBM
3.0 MB
Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_22.WEBM
11 MB
Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_23.WEBM
20 MB
Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_24.WEBM
7.4 MB
Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_25.WEBM
4.9 MB
Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_26.WEBM
48 MB
Section 1 PowerShell Automation and Security/1.4 Essential Command and Scripting Examples/SANS OnDemand_27.WEBM
40 MB
Section 1 PowerShell Automation and Security/1.5 Writing Your Own Functions and Scripts/SANS OnDemand.WEBM
799 kB
Section 1 PowerShell Automation and Security/1.5 Writing Your Own Functions and Scripts/SANS OnDemand_10.WEBM
7.5 MB
Section 1 PowerShell Automation and Security/1.5 Writing Your Own Functions and Scripts/SANS OnDemand_11.WEBM
12 MB
Section 1 PowerShell Automation and Security/1.5 Writing Your Own Functions and Scripts/SANS OnDemand_12.WEBM
4.0 MB
Section 1 PowerShell Automation and Security/1.5 Writing Your Own Functions and Scripts/SANS OnDemand_13.WEBM
35 MB
Section 1 PowerShell Automation and Security/1.5 Writing Your Own Functions and Scripts/SANS OnDemand_14.WEBM
47 kB
Section 1 PowerShell Automation and Security/1.5 Writing Your Own Functions and Scripts/SANS OnDemand_2.WEBM
874 kB
Section 1 PowerShell Automation and Security/1.5 Writing Your Own Functions and Scripts/SANS OnDemand_3.WEBM
5.4 MB
Section 1 PowerShell Automation and Security/1.5 Writing Your Own Functions and Scripts/SANS OnDemand_4.WEBM
9.5 MB
Section 1 PowerShell Automation and Security/1.5 Writing Your Own Functions and Scripts/SANS OnDemand_5.WEBM
5.2 MB
Section 1 PowerShell Automation and Security/1.5 Writing Your Own Functions and Scripts/SANS OnDemand_6.WEBM
10 MB
Section 1 PowerShell Automation and Security/1.5 Writing Your Own Functions and Scripts/SANS OnDemand_7.WEBM
10 MB
Section 1 PowerShell Automation and Security/1.5 Writing Your Own Functions and Scripts/SANS OnDemand_8.WEBM
1.7 MB
Section 1 PowerShell Automation and Security/1.5 Writing Your Own Functions and Scripts/SANS OnDemand_9.WEBM
15 MB
Section 2 Continuous Secure Configarion Enforcement/2.1 Introduction Continuous Secure Configuration Enforcement/SANS OnDemand.WEBM
193 kB
Section 2 Continuous Secure Configarion Enforcement/2.2 Security Templates/SANS OnDemand_10.WEBM
24 MB
Section 2 Continuous Secure Configarion Enforcement/2.2 Security Templates/SANS OnDemand_11.WEBM
4.1 MB
Section 2 Continuous Secure Configarion Enforcement/2.2 Security Templates/SANS OnDemand_2.WEBM
4.5 MB
Section 2 Continuous Secure Configarion Enforcement/2.2 Security Templates/SANS OnDemand_3.WEBM
2.0 MB
Section 2 Continuous Secure Configarion Enforcement/2.2 Security Templates/SANS OnDemand_4.WEBM
15 MB
Section 2 Continuous Secure Configarion Enforcement/2.2 Security Templates/SANS OnDemand_5.WEBM
29 MB
Section 2 Continuous Secure Configarion Enforcement/2.2 Security Templates/SANS OnDemand_6.WEBM
5.5 MB
Section 2 Continuous Secure Configarion Enforcement/2.2 Security Templates/SANS OnDemand_7.WEBM
2.4 MB
Section 2 Continuous Secure Configarion Enforcement/2.2 Security Templates/SANS OnDemand_8.WEBM
19 MB
Section 2 Continuous Secure Configarion Enforcement/2.2 Security Templates/SANS OnDemand_9.WEBM
8.9 MB
Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand.WEBM
1.4 MB
Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand_10.WEBM
3.0 MB
Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand_11.WEBM
48 MB
Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand_12.WEBM
51 MB
Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand_13.WEBM
3.2 MB
Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand_14.WEBM
12 MB
Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand_15.WEBM
30 MB
Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand_16.WEBM
9.4 MB
Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand_2.WEBM
7.2 MB
Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand_3.WEBM
28 MB
Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand_4.WEBM
31 MB
Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand_5.WEBM
5.7 MB
Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand_6.WEBM
52 MB
Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand_7.WEBM
26 MB
Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand_8.WEBM
32 MB
Section 2 Continuous Secure Configarion Enforcement/2.3 Group Policy Enterprise Management/SANS OnDemand_9.WEBM
24 MB
Section 2 Continuous Secure Configarion Enforcement/2.4 Server Hardening for SecOps/SANS OnDemand.WEBM
1.4 MB
Section 2 Continuous Secure Configarion Enforcement/2.4 Server Hardening for SecOps/SANS OnDemand_10.WEBM
22 MB
Section 2 Continuous Secure Configarion Enforcement/2.4 Server Hardening for SecOps/SANS OnDemand_11.WEBM
10 MB
Section 2 Continuous Secure Configarion Enforcement/2.4 Server Hardening for SecOps/SANS OnDemand_2.WEBM
7.3 MB
Section 2 Continuous Secure Configarion Enforcement/2.4 Server Hardening for SecOps/SANS OnDemand_3.WEBM
18 MB
Section 2 Continuous Secure Configarion Enforcement/2.4 Server Hardening for SecOps/SANS OnDemand_4.WEBM
21 MB
Section 2 Continuous Secure Configarion Enforcement/2.4 Server Hardening for SecOps/SANS OnDemand_5.WEBM
25 MB
Section 2 Continuous Secure Configarion Enforcement/2.4 Server Hardening for SecOps/SANS OnDemand_6.WEBM
3.0 MB
Section 2 Continuous Secure Configarion Enforcement/2.4 Server Hardening for SecOps/SANS OnDemand_7.WEBM
15 MB
Section 2 Continuous Secure Configarion Enforcement/2.4 Server Hardening for SecOps/SANS OnDemand_8.WEBM
5.7 MB
Section 2 Continuous Secure Configarion Enforcement/2.4 Server Hardening for SecOps/SANS OnDemand_9.WEBM
16 MB
Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand.WEBM
2.4 MB
Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_10.WEBM
2.6 MB
Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_11.WEBM
9.4 MB
Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_12.WEBM
19 MB
Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_13.WEBM
4.1 MB
Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_14.WEBM
6.2 MB
Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_15.WEBM
535 kB
Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_16.WEBM
2.2 MB
Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_17.WEBM
2.0 MB
Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_18.WEBM
974 kB
Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_19.WEBM
3.3 MB
Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_2.WEBM
11 MB
Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_20.WEBM
7.2 MB
Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_21.WEBM
2.2 MB
Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_22.WEBM
1.8 MB
Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_23.WEBM
6.5 MB
Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_24.WEBM
48 kB
Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_3.WEBM
3.5 MB
Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_4.WEBM
32 MB
Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_5.WEBM
4.4 MB
Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_6.WEBM
9.1 MB
Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_7.WEBM
5.5 MB
Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_8.WEBM
2.5 MB
Section 2 Continuous Secure Configarion Enforcement/2.5 Desired State Configuration/SANS OnDemand_9.WEBM
2.9 MB
Section 3 Windows PKI and Smart Cards/3.1 Introduction Windows Public Key Infrastructures and Smart Cards/SANS OnDemand.WEBM
77 kB
Section 3 Windows PKI and Smart Cards/3.2 PKI Overview, Benefits and Tools/SANS OnDemand.WEBM
18 MB
Section 3 Windows PKI and Smart Cards/3.2 PKI Overview, Benefits and Tools/SANS OnDemand_2.WEBM
6.8 MB
Section 3 Windows PKI and Smart Cards/3.2 PKI Overview, Benefits and Tools/SANS OnDemand_3.WEBM
57 MB
Section 3 Windows PKI and Smart Cards/3.2 PKI Overview, Benefits and Tools/SANS OnDemand_4.WEBM
33 MB
Section 3 Windows PKI and Smart Cards/3.2 PKI Overview, Benefits and Tools/SANS OnDemand_5.WEBM
28 MB
Learn.Windows.PowerShell.in.a.Month.of.Lunches.3rd.pdf
41 MB
Section 3 Windows PKI and Smart Cards/3.2 PKI Overview, Benefits and Tools/SANS OnDemand_7.WEBM
52 MB
Section 3 Windows PKI and Smart Cards/3.2 PKI Overview, Benefits and Tools/SANS OnDemand_8.WEBM
4.5 MB
Section 3 Windows PKI and Smart Cards/3.2 PKI Overview, Benefits and Tools/SANS OnDemand_9.WEBM
39 MB
Section 3 Windows PKI and Smart Cards/3.3 Installing Certificate Services/SANS OnDemand.WEBM
1.2 MB
Section 3 Windows PKI and Smart Cards/3.3 Installing Certificate Services/SANS OnDemand_2.WEBM
50 MB
Section 3 Windows PKI and Smart Cards/3.3 Installing Certificate Services/SANS OnDemand_3.WEBM
11 MB
Section 3 Windows PKI and Smart Cards/3.3 Installing Certificate Services/SANS OnDemand_4.WEBM
24 MB
Section 3 Windows PKI and Smart Cards/3.3 Installing Certificate Services/SANS OnDemand_5.WEBM
29 MB
Section 3 Windows PKI and Smart Cards/3.3 Installing Certificate Services/SANS OnDemand_6.WEBM
85 MB
Section 3 Windows PKI and Smart Cards/3.3 Installing Certificate Services/SANS OnDemand_7.WEBM
50 MB
Section 3 Windows PKI and Smart Cards/3.3 Installing Certificate Services/SANS OnDemand_8.WEBM
34 MB
Section 3 Windows PKI and Smart Cards/3.4 Private Key Security Best Practices/SANS OnDemand.WEBM
1.1 MB
Section 3 Windows PKI and Smart Cards/3.4 Private Key Security Best Practices/SANS OnDemand_2.WEBM
66 MB
Section 3 Windows PKI and Smart Cards/3.4 Private Key Security Best Practices/SANS OnDemand_3.WEBM
14 MB
Section 3 Windows PKI and Smart Cards/3.4 Private Key Security Best Practices/SANS OnDemand_4.WEBM
27 MB
Section 3 Windows PKI and Smart Cards/3.5 Managing Your PKI/SANS OnDemand.WEBM
90 kB
Section 3 Windows PKI and Smart Cards/3.5 Managing Your PKI/SANS OnDemand_2.WEBM
46 MB
Section 3 Windows PKI and Smart Cards/3.5 Managing Your PKI/SANS OnDemand_3.WEBM
72 MB
Section 3 Windows PKI and Smart Cards/3.5 Managing Your PKI/SANS OnDemand_4.WEBM
36 MB
Section 3 Windows PKI and Smart Cards/3.5 Managing Your PKI/SANS OnDemand_5.WEBM
51 MB
Section 3 Windows PKI and Smart Cards/3.5 Managing Your PKI/SANS OnDemand_6.WEBM
9.5 MB
Section 3 Windows PKI and Smart Cards/3.5 Managing Your PKI/SANS OnDemand_7.WEBM
34 MB
Section 3 Windows PKI and Smart Cards/3.5 Managing Your PKI/SANS OnDemand_8.WEBM
39 MB
Section 3 Windows PKI and Smart Cards/3.6 Smart Cards and TPMs/SANS OnDemand.WEBM
858 kB
Section 3 Windows PKI and Smart Cards/3.6 Smart Cards and TPMs/SANS OnDemand_2.WEBM
48 MB
Section 3 Windows PKI and Smart Cards/3.6 Smart Cards and TPMs/SANS OnDemand_3.WEBM
6.1 MB
Section 3 Windows PKI and Smart Cards/3.6 Smart Cards and TPMs/SANS OnDemand_4.WEBM
11 MB
Section 3 Windows PKI and Smart Cards/3.6 Smart Cards and TPMs/SANS OnDemand_5.WEBM
38 MB
Section 3 Windows PKI and Smart Cards/3.6 Smart Cards and TPMs/SANS OnDemand_6.WEBM
966 kB
Section 4 Administrative Compromise and Privilege Management/4.1 Introduction Administrative Compromise and Privilege Management/SANS OnDemand.WEBM
89 kB
Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand.WEBM
24 MB
Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_10.WEBM
20 MB
Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_11.WEBM
45 MB
Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_12.WEBM
33 MB
Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_13.WEBM
31 MB
Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_14.WEBM
5.1 MB
Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_15.WEBM
2.8 MB
Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_16.WEBM
16 MB
Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_17.WEBM
54 MB
Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_18.WEBM
38 MB
Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_19.WEBM
33 MB
Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_2.WEBM
90 kB
Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_20.WEBM
17 MB
Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_21.WEBM
36 MB
Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_22.WEBM
67 MB
Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_23.WEBM
34 MB
Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_24.WEBM
51 MB
Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_25.WEBM
36 MB
Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_26.WEBM
29 MB
Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_27.WEBM
23 MB
Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_28.WEBM
45 MB
Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_29.WEBM
51 MB
Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_3.WEBM
2.0 MB
Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_30.WEBM
4.0 MB
Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_31.WEBM
21 MB
Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_32.WEBM
4.9 MB
Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_33.WEBM
3.0 MB
Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_34.WEBM
20 MB
Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_35.WEBM
12 MB
Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_36.WEBM
9.1 MB
Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_37.WEBM
7.4 MB
Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_38.WEBM
6.7 MB
Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_4.WEBM
17 MB
Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_5.WEBM
80 MB
Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_6.WEBM
22 MB
Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_7.WEBM
56 MB
Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_8.WEBM
3.0 MB
Section 4 Administrative Compromise and Privilege Management/4.2 Managing Administrative Privileges/SANS OnDemand_9.WEBM
7.3 MB
Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand.WEBM
3.2 MB
Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_10.WEBM
11 MB
Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_11.WEBM
9.1 MB
Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_12.WEBM
4.4 MB
Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_13.WEBM
6.0 MB
Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_14.WEBM
9.9 MB
Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_15.WEBM
1.2 MB
Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_16.WEBM
3.9 MB
Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_17.WEBM
41 MB
Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_2.WEBM
8.2 MB
Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_3.WEBM
1.5 MB
Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_4.WEBM
3.4 MB
Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_5.WEBM
4.1 MB
Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_6.WEBM
3.1 MB
Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_7.WEBM
4.5 MB
Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_8.WEBM
1.0 MB
Section 4 Administrative Compromise and Privilege Management/4.3 PowerShell Just Enough Admin ( JEA )/SANS OnDemand_9.WEBM
3.7 MB
Section 4 Administrative Compromise and Privilege Management/4.4 Managing Administrative Privileges In Active Directory/SANS OnDemand.WEBM
392 kB
Section 4 Administrative Compromise and Privilege Management/4.4 Managing Administrative Privileges In Active Directory/SANS OnDemand_10.WEBM
8.5 MB
Section 4 Administrative Compromise and Privilege Management/4.4 Managing Administrative Privileges In Active Directory/SANS OnDemand_11.WEBM
1.6 MB
Section 4 Administrative Compromise and Privilege Management/4.4 Managing Administrative Privileges In Active Directory/SANS OnDemand_2.WEBM
6.3 MB
Section 4 Administrative Compromise and Privilege Management/4.4 Managing Administrative Privileges In Active Directory/SANS OnDemand_3.WEBM
46 MB
Section 4 Administrative Compromise and Privilege Management/4.4 Managing Administrative Privileges In Active Directory/SANS OnDemand_4.WEBM
7.2 MB
Section 4 Administrative Compromise and Privilege Management/4.4 Managing Administrative Privileges In Active Directory/SANS OnDemand_5.WEBM
18 MB
Section 4 Administrative Compromise and Privilege Management/4.4 Managing Administrative Privileges In Active Directory/SANS OnDemand_6.WEBM
29 MB
Section 4 Administrative Compromise and Privilege Management/4.4 Managing Administrative Privileges In Active Directory/SANS OnDemand_7.WEBM
11 MB
Section 4 Administrative Compromise and Privilege Management/4.4 Managing Administrative Privileges In Active Directory/SANS OnDemand_8.WEBM
7.5 MB
Section 4 Administrative Compromise and Privilege Management/4.4 Managing Administrative Privileges In Active Directory/SANS OnDemand_9.WEBM
1.9 MB
Section 5 Endpoint Protection and Pre-Forensics/5.1 Introduction Endpoint Protection and Pre-Forensics/SANS OnDemand.WEBM
171 kB
Section 5 Endpoint Protection and Pre-Forensics/5.2 Host-Based Windows Firewalls/SANS OnDemand.WEBM
6.5 MB
Section 5 Endpoint Protection and Pre-Forensics/5.2 Host-Based Windows Firewalls/SANS OnDemand_10.WEBM
9.1 MB
Section 5 Endpoint Protection and Pre-Forensics/5.2 Host-Based Windows Firewalls/SANS OnDemand_11.WEBM
34 MB
Section 5 Endpoint Protection and Pre-Forensics/5.2 Host-Based Windows Firewalls/SANS OnDemand_12.WEBM
3.6 MB
Section 5 Endpoint Protection and Pre-Forensics/5.2 Host-Based Windows Firewalls/SANS OnDemand_2.WEBM
725 kB
Section 5 Endpoint Protection and Pre-Forensics/5.2 Host-Based Windows Firewalls/SANS OnDemand_3.WEBM
16 MB
Section 5 Endpoint Protection and Pre-Forensics/5.2 Host-Based Windows Firewalls/SANS OnDemand_4.WEBM
2.8 MB
Section 5 Endpoint Protection and Pre-Forensics/5.2 Host-Based Windows Firewalls/SANS OnDemand_5.WEBM
12 MB
Section 5 Endpoint Protection and Pre-Forensics/5.2 Host-Based Windows Firewalls/SANS OnDemand_6.WEBM
14 MB
Section 5 Endpoint Protection and Pre-Forensics/5.2 Host-Based Windows Firewalls/SANS OnDemand_7.WEBM
74 MB
Section 5 Endpoint Protection and Pre-Forensics/5.2 Host-Based Windows Firewalls/SANS OnDemand_8.WEBM
57 MB
Section 5 Endpoint Protection and Pre-Forensics/5.2 Host-Based Windows Firewalls/SANS OnDemand_9.WEBM
5.3 MB
Section 5 Endpoint Protection and Pre-Forensics/5.3 IPSec For Role-Based Port Control/SANS OnDemand.WEBM
430 kB
Section 5 Endpoint Protection and Pre-Forensics/5.3 IPSec For Role-Based Port Control/SANS OnDemand_10.WEBM
282 kB
Section 5 Endpoint Protection and Pre-Forensics/5.3 IPSec For Role-Based Port Control/SANS OnDemand_11.WEBM
204 kB
Section 5 Endpoint Protection and Pre-Forensics/5.3 IPSec For Role-Based Port Control/SANS OnDemand_12.WEBM
39 MB
Section 5 Endpoint Protection and Pre-Forensics/5.3 IPSec For Role-Based Port Control/SANS OnDemand_2.WEBM
22 MB
Section 5 Endpoint Protection and Pre-Forensics/5.3 IPSec For Role-Based Port Control/SANS OnDemand_3.WEBM
17 MB
Section 5 Endpoint Protection and Pre-Forensics/5.3 IPSec For Role-Based Port Control/SANS OnDemand_4.WEBM
2.4 MB
Section 5 Endpoint Protection and Pre-Forensics/5.3 IPSec For Role-Based Port Control/SANS OnDemand_5.WEBM
21 MB
Section 5 Endpoint Protection and Pre-Forensics/5.3 IPSec For Role-Based Port Control/SANS OnDemand_6.WEBM
9.6 MB
Section 5 Endpoint Protection and Pre-Forensics/5.3 IPSec For Role-Based Port Control/SANS OnDemand_7.WEBM
9.0 MB
Section 5 Endpoint Protection and Pre-Forensics/5.3 IPSec For Role-Based Port Control/SANS OnDemand_8.WEBM
67 MB
Section 5 Endpoint Protection and Pre-Forensics/5.3 IPSec For Role-Based Port Control/SANS OnDemand_9.WEBM
222 kB
Section 5 Endpoint Protection and Pre-Forensics/5.4 Firewall and IPSec Endpoint Automation/SANS OnDemand.WEBM
2.8 MB
Section 5 Endpoint Protection and Pre-Forensics/5.4 Firewall and IPSec Endpoint Automation/SANS OnDemand_2.WEBM
5.8 MB
Section 5 Endpoint Protection and Pre-Forensics/5.4 Firewall and IPSec Endpoint Automation/SANS OnDemand_3.WEBM
18 MB
Section 5 Endpoint Protection and Pre-Forensics/5.4 Firewall and IPSec Endpoint Automation/SANS OnDemand_4.WEBM
15 MB
Section 5 Endpoint Protection and Pre-Forensics/5.4 Firewall and IPSec Endpoint Automation/SANS OnDemand_5.WEBM
2.8 MB
Section 5 Endpoint Protection and Pre-Forensics/5.4 Firewall and IPSec Endpoint Automation/SANS OnDemand_6.WEBM
4.3 MB
Section 5 Endpoint Protection and Pre-Forensics/5.5 Anti-Exploit Techniques/SANS OnDemand.WEBM
855 kB
Section 5 Endpoint Protection and Pre-Forensics/5.5 Anti-Exploit Techniques/SANS OnDemand_10.WEBM
4.3 MB
Section 5 Endpoint Protection and Pre-Forensics/5.5 Anti-Exploit Techniques/SANS OnDemand_11.WEBM
14 MB
Section 5 Endpoint Protection and Pre-Forensics/5.5 Anti-Exploit Techniques/SANS OnDemand_12.WEBM
2.5 MB
Section 5 Endpoint Protection and Pre-Forensics/5.5 Anti-Exploit Techniques/SANS OnDemand_13.WEBM
22 MB
Section 5 Endpoint Protection and Pre-Forensics/5.5 Anti-Exploit Techniques/SANS OnDemand_14.WEBM
492 kB
Section 5 Endpoint Protection and Pre-Forensics/5.5 Anti-Exploit Techniques/SANS OnDemand_2.WEBM
14 MB
Section 5 Endpoint Protection and Pre-Forensics/5.5 Anti-Exploit Techniques/SANS OnDemand_3.WEBM
2.1 MB
Section 5 Endpoint Protection and Pre-Forensics/5.5 Anti-Exploit Techniques/SANS OnDemand_4.WEBM
14 MB
Section 5 Endpoint Protection and Pre-Forensics/5.5 Anti-Exploit Techniques/SANS OnDemand_5.WEBM
1.7 MB
Section 5 Endpoint Protection and Pre-Forensics/5.5 Anti-Exploit Techniques/SANS OnDemand_6.WEBM
23 MB
Section 5 Endpoint Protection and Pre-Forensics/5.5 Anti-Exploit Techniques/SANS OnDemand_7.WEBM
25 MB
Section 5 Endpoint Protection and Pre-Forensics/5.5 Anti-Exploit Techniques/SANS OnDemand_8.WEBM
6.3 MB
Section 5 Endpoint Protection and Pre-Forensics/5.5 Anti-Exploit Techniques/SANS OnDemand_9.WEBM
7.9 MB
Section 5 Endpoint Protection and Pre-Forensics/5.6 Assume Breach With Pre-Forensics/SANS OnDemand.WEBM
766 kB
Section 5 Endpoint Protection and Pre-Forensics/5.6 Assume Breach With Pre-Forensics/SANS OnDemand_10.WEBM
355 kB
Section 5 Endpoint Protection and Pre-Forensics/5.6 Assume Breach With Pre-Forensics/SANS OnDemand_2.WEBM
7.6 MB
Section 5 Endpoint Protection and Pre-Forensics/5.6 Assume Breach With Pre-Forensics/SANS OnDemand_3.WEBM
10 MB
Section 5 Endpoint Protection and Pre-Forensics/5.6 Assume Breach With Pre-Forensics/SANS OnDemand_4.WEBM
21 MB
Section 5 Endpoint Protection and Pre-Forensics/5.6 Assume Breach With Pre-Forensics/SANS OnDemand_5.WEBM
9.7 MB
Section 5 Endpoint Protection and Pre-Forensics/5.6 Assume Breach With Pre-Forensics/SANS OnDemand_6.WEBM
28 MB
Section 5 Endpoint Protection and Pre-Forensics/5.6 Assume Breach With Pre-Forensics/SANS OnDemand_7.WEBM
12 MB
Section 5 Endpoint Protection and Pre-Forensics/5.6 Assume Breach With Pre-Forensics/SANS OnDemand_8.WEBM
13 MB
Section 5 Endpoint Protection and Pre-Forensics/5.6 Assume Breach With Pre-Forensics/SANS OnDemand_9.WEBM
3.0 MB
Section 6 Defensible Networking and Blue Team WMI/6.1 Introduction Defensible Networking and Blue Team WMI/SANS OnDemand.WEBM
449 kB
Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand.WEBM
1.4 MB
Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_10.WEBM
3.2 MB
Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_11.WEBM
10 MB
Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_12.WEBM
5.8 MB
Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_13.WEBM
3.7 MB
Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_14.WEBM
4.9 MB
Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_15.WEBM
15 MB
Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_16.WEBM
27 MB
Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_17.WEBM
22 MB
Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_18.WEBM
9.8 MB
Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_19.WEBM
16 MB
Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_2.WEBM
597 kB
Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_3.WEBM
7.6 MB
Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_4.WEBM
3.6 MB
Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_5.WEBM
36 MB
Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_6.WEBM
2.8 MB
Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_7.WEBM
3.6 MB
Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_8.WEBM
15 MB
Section 6 Defensible Networking and Blue Team WMI/6.2 WMI for The Blue Team/SANS OnDemand_9.WEBM
6.8 MB
Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand.WEBM
562 kB
Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_10.WEBM
20 MB
Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_11.WEBM
4.3 MB
Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_12.WEBM
21 MB
Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_13.WEBM
7.7 MB
Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_14.WEBM
11 MB
Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_15.WEBM
40 MB
Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_16.WEBM
2.0 MB
Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_17.WEBM
5.5 MB
Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_18.WEBM
5.4 MB
Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_19.WEBM
16 MB
Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_2.WEBM
6.4 MB
Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_20.WEBM
11 MB
Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_21.WEBM
20 MB
Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_22.WEBM
5.1 MB
Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_23.WEBM
7.3 MB
Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_24.WEBM
13 MB
Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_25.WEBM
7.0 MB
Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_26.WEBM
3.6 MB
Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_27.WEBM
26 MB
Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_28.WEBM
1.2 MB
Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_29.WEBM
68 kB
Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_3.WEBM
1.7 MB
Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_4.WEBM
22 MB
Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_5.WEBM
27 MB
Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_6.WEBM
8.9 MB
Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_7.WEBM
66 MB
Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_8.WEBM
29 MB
Section 6 Defensible Networking and Blue Team WMI/6.3 Hardening Exploitable Protocols and Services/SANS OnDemand_9.WEBM
1.5 MB
windows-powershell-action-3rd.pdf
11 MB