elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Size
Parent Directory -
83. Hunting With Notebooks.mp4 118M
82. Sentinel Bookmarks.mp4 30M
81. Hunting With Livestreams.mp4 24M
80. Threat Hunting Queries.mp4 38M
79. Security Operations Efficiency Workbook.mp4 38M
78. Custom Workbooks.mp4 53M
77. Sentinel Workbooks.mp4 77M
76. User and Entity Behavior Analytics (UEBA).mp4 42M
75. Multi-Workspace Incidents.mp4 21M
74. Incidents Within Sentinel.mp4 86M
73. Defender Playbooks.mp4 28M
72. Automation Rules.mp4 38M
71. Creating Playbooks.mp4 41M
70. KQL Exercise.mp4 62M
69. Incident Creation Logic with KQL.mp4 115M
68. Connector Provided Queries and Workflow.mp4 33M
67. Custom Analytics Rules.mp4 33M
66. Activate Microsoft Security Analytics Rules.mp4 25M
65. Design and Configure Analytics Rules.mp4 80M
64. Intro to Sentinel Analytics Rules.mp4 9.3M
63. Ingesting Custom Logs.mp4 49M
62. Threat Intelligence Connectors.mp4 49M
61. Syslog and CEF Event Collectors.mp4 89M
60. Configuring Data Connectors Via Policies.mp4 43M
59. Data Sources and Prerequisites.mp4 66M
58. Microsoft Sentinel Data Storage.mp4 112M
57. Microsoft Sentinel Roles.mp4 53M
56. Setting Up Microsoft Sentinel.mp4 27M
55. Microsoft Sentinel Workspaces.mp4 56M
54. SIEMs and SOARs.mp4 47M
53. Data Privacy.mp4 22M
52. Key Vault Alerts.mp4 32M
51. Threat Intelligence.mp4 18M
50. Managing Alerts.mp4 98M
49. Types of Alerts.mp4 24M
48. Automated Responses.mp4 91M
47. Intro Managing Defender for Cloud.mp4 18M
46. Cloud Alert Rules.mp4 56M
45. Connect GCP Cloud Resources.mp4 31M
44. Connect AWS Cloud Resources.mp4 36M
43. Data Connectors.mp4 37M
42. Data Retention and Recommendations.mp4 66M
41. Microsoft Defender for Cloud.mp4 63M
40. Attack Simulation Training.mp4 50M
39. Cross-Domain Investigations.mp4 41M
38. Cloud App Policies.mp4 35M
37. Investigating Cloud App Activity.mp4 88M
36. Discovering Cloud Apps.mp4 76M
35. Microsoft Defender for Cloud Apps.mp4 35M
34. Investigating Defender for Identity Events.mp4 31M
33. Tagging Sensitive Accounts.mp4 24M
32. Using Secure Score.mp4 38M
31. Investigating Azure Identity Events.mp4 31M
30. Conditional Access Policies.mp4 33M
29. Azure Identity Policies.mp4 36M
28. MS Defender for Endpoint.mp4 30M
27. Threat Analytics.mp4 26M
26. Recommended Endpoint Configurations.mp4 33M
25. Responding to Incidents.mp4 62M
24. Custom Detection Alerts.mp4 25M
23. Attack Surface Reduction Rules.mp4 24M
22. Data Settings and Alert Notifications.mp4 27M
21. Automated Investigation and Response (AIR).mp4 32M
20. Into to MS Defender for Endpoint.mp4 37M
19. Insider Risk Policies.mp4 30M
18. Sensitivity Labels.mp4 43M
17. DLP Policies and Alerts.mp4 34M
16. User Email Submissions.mp4 33M
15. Detect, Investigate, Respond and Remediate Threats.mp4 114M
14. Teams, Sharepoint and OneDrive Policies.mp4 48M
13. Protecting Office 365.mp4 34M
12. MS 365 Defender Policies & Rules Alert and Activity Policies.mp4 21M
11. MS 365 Defender Policies & Rules Additional Rules.mp4 40M
10. MS 365 Defender Policies & Rules AllowBlock Lists.mp4 19M
9. MS 365 Defender Policies & Rules Anti-Malware, Safe Attachments & Safe Links.mp4 41M
8. MS 365 Defender Policies & Rules Anti-SPAM.mp4 32M
7. MS 365 Defender Policies & Rules Anti-Phishing.mp4 51M
6. MS 365 Defender Policies & Rules Built-In Rules.mp4 49M
5. Microsoft 365 Defender Portal Wrap-Up.mp4 52M
4. Microsoft 365 Defender Portal Email & Collaboration.mp4 35M
3. Microsoft 365 Defender Portal Endpoints.mp4 53M
2. Microsoft 365 Defender Portal Introduction.mp4 86M
1. Getting to Know MS 365 Defender.mp4 44M