elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Size
Parent Directory -
1. Getting to Know MS 365 Defender.mp4 44M
2. Microsoft 365 Defender Portal Introduction.mp4 86M
3. Microsoft 365 Defender Portal Endpoints.mp4 53M
4. Microsoft 365 Defender Portal Email & Collaboration.mp4 35M
5. Microsoft 365 Defender Portal Wrap-Up.mp4 52M
6. MS 365 Defender Policies & Rules Built-In Rules.mp4 49M
7. MS 365 Defender Policies & Rules Anti-Phishing.mp4 51M
8. MS 365 Defender Policies & Rules Anti-SPAM.mp4 32M
9. MS 365 Defender Policies & Rules Anti-Malware, Safe Attachments & Safe Links.mp4 41M
10. MS 365 Defender Policies & Rules AllowBlock Lists.mp4 19M
11. MS 365 Defender Policies & Rules Additional Rules.mp4 40M
12. MS 365 Defender Policies & Rules Alert and Activity Policies.mp4 21M
13. Protecting Office 365.mp4 34M
14. Teams, Sharepoint and OneDrive Policies.mp4 48M
15. Detect, Investigate, Respond and Remediate Threats.mp4 114M
16. User Email Submissions.mp4 33M
17. DLP Policies and Alerts.mp4 34M
18. Sensitivity Labels.mp4 43M
19. Insider Risk Policies.mp4 30M
20. Into to MS Defender for Endpoint.mp4 37M
21. Automated Investigation and Response (AIR).mp4 32M
22. Data Settings and Alert Notifications.mp4 27M
23. Attack Surface Reduction Rules.mp4 24M
24. Custom Detection Alerts.mp4 25M
25. Responding to Incidents.mp4 62M
26. Recommended Endpoint Configurations.mp4 33M
27. Threat Analytics.mp4 26M
28. MS Defender for Endpoint.mp4 30M
29. Azure Identity Policies.mp4 36M
30. Conditional Access Policies.mp4 33M
31. Investigating Azure Identity Events.mp4 31M
32. Using Secure Score.mp4 38M
33. Tagging Sensitive Accounts.mp4 24M
34. Investigating Defender for Identity Events.mp4 31M
35. Microsoft Defender for Cloud Apps.mp4 35M
36. Discovering Cloud Apps.mp4 76M
37. Investigating Cloud App Activity.mp4 88M
38. Cloud App Policies.mp4 35M
39. Cross-Domain Investigations.mp4 41M
40. Attack Simulation Training.mp4 50M
41. Microsoft Defender for Cloud.mp4 63M
42. Data Retention and Recommendations.mp4 66M
43. Data Connectors.mp4 37M
44. Connect AWS Cloud Resources.mp4 36M
45. Connect GCP Cloud Resources.mp4 31M
46. Cloud Alert Rules.mp4 56M
47. Intro Managing Defender for Cloud.mp4 18M
48. Automated Responses.mp4 91M
49. Types of Alerts.mp4 24M
50. Managing Alerts.mp4 98M
51. Threat Intelligence.mp4 18M
52. Key Vault Alerts.mp4 32M
53. Data Privacy.mp4 22M
54. SIEMs and SOARs.mp4 47M
55. Microsoft Sentinel Workspaces.mp4 56M
56. Setting Up Microsoft Sentinel.mp4 27M
57. Microsoft Sentinel Roles.mp4 53M
58. Microsoft Sentinel Data Storage.mp4 112M
59. Data Sources and Prerequisites.mp4 66M
60. Configuring Data Connectors Via Policies.mp4 43M
61. Syslog and CEF Event Collectors.mp4 89M
62. Threat Intelligence Connectors.mp4 49M
63. Ingesting Custom Logs.mp4 49M
64. Intro to Sentinel Analytics Rules.mp4 9.3M
65. Design and Configure Analytics Rules.mp4 80M
66. Activate Microsoft Security Analytics Rules.mp4 25M
67. Custom Analytics Rules.mp4 33M
68. Connector Provided Queries and Workflow.mp4 33M
69. Incident Creation Logic with KQL.mp4 115M
70. KQL Exercise.mp4 62M
71. Creating Playbooks.mp4 41M
72. Automation Rules.mp4 38M
73. Defender Playbooks.mp4 28M
74. Incidents Within Sentinel.mp4 86M
75. Multi-Workspace Incidents.mp4 21M
76. User and Entity Behavior Analytics (UEBA).mp4 42M
77. Sentinel Workbooks.mp4 77M
78. Custom Workbooks.mp4 53M
79. Security Operations Efficiency Workbook.mp4 38M
80. Threat Hunting Queries.mp4 38M
81. Hunting With Livestreams.mp4 24M
82. Sentinel Bookmarks.mp4 30M
83. Hunting With Notebooks.mp4 118M