TorBT - Torrents and Magnet Links Search Engine

[ CourseWikia.com ] Microsoft Defender for Office 365

File Name
Size
Get Bonus Downloads Here.url
181 B
~Get Your Files Here !/01 - Introduction/01 - Secure your organization with Microsoft Defender.mp4
3.4 MB
~Get Your Files Here !/01 - Introduction/01 - Secure your organization with Microsoft Defender.srt
1.1 kB
~Get Your Files Here !/01 - Introduction/02 - What you should know.mp4
3.1 MB
~Get Your Files Here !/01 - Introduction/02 - What you should know.srt
3.6 kB
~Get Your Files Here !/01 - Introduction/03 - Course lab setup.mp4
4.1 MB
~Get Your Files Here !/01 - Introduction/03 - Course lab setup.srt
4.4 kB
~Get Your Files Here !/01 - Introduction/04 - Licensing.mp4
16 MB
~Get Your Files Here !/01 - Introduction/04 - Licensing.srt
13 kB
~Get Your Files Here !/01 - Introduction/05 - Accessing the Defender Portal.mp4
12 MB
~Get Your Files Here !/01 - Introduction/05 - Accessing the Defender Portal.srt
10 kB
~Get Your Files Here !/02 - 1. Preset Threat Protection Policies/01 - Preset security policies and rules.mp4
8.6 MB
~Get Your Files Here !/02 - 1. Preset Threat Protection Policies/02 - Exchange Online Policies (EOP) anti-spam policies.mp4
19 MB
~Get Your Files Here !/02 - 1. Preset Threat Protection Policies/02 - Exchange Online Policies (EOP) anti-spam policies.srt
18 kB
~Get Your Files Here !/02 - 1. Preset Threat Protection Policies/03 - Configuration analyzer.mp4
9.4 MB
~Get Your Files Here !/02 - 1. Preset Threat Protection Policies/03 - Configuration analyzer.srt
6.6 kB
~Get Your Files Here !/02 - 1. Preset Threat Protection Policies/04 - Allow and Block lists.mp4
12 MB
~Get Your Files Here !/02 - 1. Preset Threat Protection Policies/04 - Allow and Block lists.srt
12 kB
~Get Your Files Here !/02 - 1. Preset Threat Protection Policies/05 - Scenario What would you do.mp4
4.6 MB
~Get Your Files Here !/02 - 1. Preset Threat Protection Policies/05 - Scenario What would you do.srt
5.7 kB
~Get Your Files Here !/03 - 2. Custom Threat Protection Policies/01 - Anti-phishing.mp4
13 MB
~Get Your Files Here !/03 - 2. Custom Threat Protection Policies/01 - Anti-phishing.srt
12 kB
~Get Your Files Here !/03 - 2. Custom Threat Protection Policies/02 - Safe Attachments.mp4
8.4 MB
~Get Your Files Here !/03 - 2. Custom Threat Protection Policies/02 - Safe Attachments.srt
8.2 kB
~Get Your Files Here !/03 - 2. Custom Threat Protection Policies/03 - Safe Links.mp4
4.2 MB
~Get Your Files Here !/03 - 2. Custom Threat Protection Policies/03 - Safe Links.srt
4.3 kB
~Get Your Files Here !/03 - 2. Custom Threat Protection Policies/04 - Anti-spam.mp4
12 MB
~Get Your Files Here !/03 - 2. Custom Threat Protection Policies/04 - Anti-spam.srt
13 kB
~Get Your Files Here !/03 - 2. Custom Threat Protection Policies/05 - Anti-malware.mp4
9.0 MB
~Get Your Files Here !/03 - 2. Custom Threat Protection Policies/05 - Anti-malware.srt
8.3 kB
~Get Your Files Here !/03 - 2. Custom Threat Protection Policies/06 - Alert policies.mp4
11 MB
~Get Your Files Here !/03 - 2. Custom Threat Protection Policies/06 - Alert policies.srt
8.5 kB
~Get Your Files Here !/03 - 2. Custom Threat Protection Policies/07 - Scenario What would you do.mp4
4.2 MB
~Get Your Files Here !/03 - 2. Custom Threat Protection Policies/07 - Scenario What would you do.srt
4.0 kB
~Get Your Files Here !/04 - 3. Cloud App Policies/01 - Overview of Cloud App Protection in Defender for Office 365.mp4
3.7 MB
~Get Your Files Here !/04 - 3. Cloud App Policies/01 - Overview of Cloud App Protection in Defender for Office 365.srt
3.4 kB
~Get Your Files Here !/04 - 3. Cloud App Policies/02 - Cloud App Catalog.mp4
11 MB
~Get Your Files Here !/04 - 3. Cloud App Policies/02 - Cloud App Catalog.srt
7.7 kB
~Get Your Files Here !/04 - 3. Cloud App Policies/03 - Create Cloud App policies.mp4
17 MB
~Get Your Files Here !/04 - 3. Cloud App Policies/03 - Create Cloud App policies.srt
13 kB
~Get Your Files Here !/04 - 3. Cloud App Policies/04 - Scenario What would you do.mp4
5.4 MB
~Get Your Files Here !/04 - 3. Cloud App Policies/04 - Scenario What would you do.srt
6.5 kB
~Get Your Files Here !/05 - 4. Reports/01 - Utilize message trace to track an email.mp4
11 MB
~Get Your Files Here !/05 - 4. Reports/01 - Utilize message trace to track an email.srt
9.5 kB
~Get Your Files Here !/05 - 4. Reports/02 - Analyze the health of the system.mp4
11 MB
~Get Your Files Here !/05 - 4. Reports/02 - Analyze the health of the system.srt
7.6 kB
~Get Your Files Here !/05 - 4. Reports/03 - Configure permissions and roles.mp4
9.6 MB
~Get Your Files Here !/05 - 4. Reports/03 - Configure permissions and roles.srt
7.5 kB
~Get Your Files Here !/05 - 4. Reports/04 - Incidents and alerts.mp4
8.5 MB
~Get Your Files Here !/05 - 4. Reports/04 - Incidents and alerts.srt
7.5 kB
~Get Your Files Here !/05 - 4. Reports/05 - Scenario What would you do.mp4
3.9 MB
~Get Your Files Here !/05 - 4. Reports/05 - Scenario What would you do.srt
4.6 kB
~Get Your Files Here !/06 - 5. Threat Investigation and Response Capabilities/01 - Guided threat hunting.mp4
14 MB
~Get Your Files Here !/06 - 5. Threat Investigation and Response Capabilities/01 - Guided threat hunting.srt
10 kB
~Get Your Files Here !/06 - 5. Threat Investigation and Response Capabilities/02 - Schema alerts.mp4
7.3 MB
~Get Your Files Here !/06 - 5. Threat Investigation and Response Capabilities/02 - Schema alerts.srt
5.2 kB
~Get Your Files Here !/06 - 5. Threat Investigation and Response Capabilities/03 - Learning Kusto Query Language (KQL).mp4
13 MB
~Get Your Files Here !/06 - 5. Threat Investigation and Response Capabilities/03 - Learning Kusto Query Language (KQL).srt
12 kB
~Get Your Files Here !/06 - 5. Threat Investigation and Response Capabilities/04 - Scenario What would you do.mp4
4.6 MB
~Get Your Files Here !/06 - 5. Threat Investigation and Response Capabilities/04 - Scenario What would you do.srt
5.0 kB
~Get Your Files Here !/07 - Conclusion/01 - Next steps.mp4
1.5 MB
~Get Your Files Here !/07 - Conclusion/01 - Next steps.srt
1.8 kB
~Get Your Files Here !/Bonus Resources.txt
386 B