elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Size
Parent Directory -
64. Intro to Sentinel Analytics Rules.mp4 9.3M
47. Intro Managing Defender for Cloud.mp4 18M
51. Threat Intelligence.mp4 18M
10. MS 365 Defender Policies & Rules AllowBlock Lists.mp4 19M
75. Multi-Workspace Incidents.mp4 21M
12. MS 365 Defender Policies & Rules Alert and Activity Policies.mp4 21M
53. Data Privacy.mp4 22M
81. Hunting With Livestreams.mp4 24M
33. Tagging Sensitive Accounts.mp4 24M
49. Types of Alerts.mp4 24M
23. Attack Surface Reduction Rules.mp4 24M
24. Custom Detection Alerts.mp4 25M
66. Activate Microsoft Security Analytics Rules.mp4 25M
27. Threat Analytics.mp4 26M
22. Data Settings and Alert Notifications.mp4 27M
56. Setting Up Microsoft Sentinel.mp4 27M
73. Defender Playbooks.mp4 28M
19. Insider Risk Policies.mp4 30M
28. MS Defender for Endpoint.mp4 30M
82. Sentinel Bookmarks.mp4 30M
34. Investigating Defender for Identity Events.mp4 31M
31. Investigating Azure Identity Events.mp4 31M
45. Connect GCP Cloud Resources.mp4 31M
8. MS 365 Defender Policies & Rules Anti-SPAM.mp4 32M
21. Automated Investigation and Response (AIR).mp4 32M
52. Key Vault Alerts.mp4 32M
68. Connector Provided Queries and Workflow.mp4 33M
30. Conditional Access Policies.mp4 33M
26. Recommended Endpoint Configurations.mp4 33M
16. User Email Submissions.mp4 33M
67. Custom Analytics Rules.mp4 33M
17. DLP Policies and Alerts.mp4 34M
13. Protecting Office 365.mp4 34M
38. Cloud App Policies.mp4 35M
35. Microsoft Defender for Cloud Apps.mp4 35M
4. Microsoft 365 Defender Portal Email & Collaboration.mp4 35M
29. Azure Identity Policies.mp4 36M
44. Connect AWS Cloud Resources.mp4 36M
43. Data Connectors.mp4 37M
20. Into to MS Defender for Endpoint.mp4 37M
80. Threat Hunting Queries.mp4 38M
79. Security Operations Efficiency Workbook.mp4 38M
72. Automation Rules.mp4 38M
32. Using Secure Score.mp4 38M
11. MS 365 Defender Policies & Rules Additional Rules.mp4 40M
71. Creating Playbooks.mp4 41M
9. MS 365 Defender Policies & Rules Anti-Malware, Safe Attachments & Safe Links.mp4 41M
39. Cross-Domain Investigations.mp4 41M
76. User and Entity Behavior Analytics (UEBA).mp4 42M
18. Sensitivity Labels.mp4 43M
60. Configuring Data Connectors Via Policies.mp4 43M
1. Getting to Know MS 365 Defender.mp4 44M
54. SIEMs and SOARs.mp4 47M
14. Teams, Sharepoint and OneDrive Policies.mp4 48M
6. MS 365 Defender Policies & Rules Built-In Rules.mp4 49M
62. Threat Intelligence Connectors.mp4 49M
63. Ingesting Custom Logs.mp4 49M
40. Attack Simulation Training.mp4 50M
7. MS 365 Defender Policies & Rules Anti-Phishing.mp4 51M
5. Microsoft 365 Defender Portal Wrap-Up.mp4 52M
3. Microsoft 365 Defender Portal Endpoints.mp4 53M
57. Microsoft Sentinel Roles.mp4 53M
78. Custom Workbooks.mp4 53M
55. Microsoft Sentinel Workspaces.mp4 56M
46. Cloud Alert Rules.mp4 56M
25. Responding to Incidents.mp4 62M
70. KQL Exercise.mp4 62M
41. Microsoft Defender for Cloud.mp4 63M
59. Data Sources and Prerequisites.mp4 66M
42. Data Retention and Recommendations.mp4 66M
36. Discovering Cloud Apps.mp4 76M
77. Sentinel Workbooks.mp4 77M
65. Design and Configure Analytics Rules.mp4 80M
74. Incidents Within Sentinel.mp4 86M
2. Microsoft 365 Defender Portal Introduction.mp4 86M
37. Investigating Cloud App Activity.mp4 88M
61. Syslog and CEF Event Collectors.mp4 89M
48. Automated Responses.mp4 91M
50. Managing Alerts.mp4 98M
58. Microsoft Sentinel Data Storage.mp4 112M
15. Detect, Investigate, Respond and Remediate Threats.mp4 114M
69. Incident Creation Logic with KQL.mp4 115M
83. Hunting With Notebooks.mp4 118M