elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Size
Parent Directory -
83. Hunting With Notebooks.mp4 118M
69. Incident Creation Logic with KQL.mp4 115M
15. Detect, Investigate, Respond and Remediate Threats.mp4 114M
58. Microsoft Sentinel Data Storage.mp4 112M
50. Managing Alerts.mp4 98M
48. Automated Responses.mp4 91M
61. Syslog and CEF Event Collectors.mp4 89M
37. Investigating Cloud App Activity.mp4 88M
2. Microsoft 365 Defender Portal Introduction.mp4 86M
74. Incidents Within Sentinel.mp4 86M
65. Design and Configure Analytics Rules.mp4 80M
77. Sentinel Workbooks.mp4 77M
36. Discovering Cloud Apps.mp4 76M
42. Data Retention and Recommendations.mp4 66M
59. Data Sources and Prerequisites.mp4 66M
41. Microsoft Defender for Cloud.mp4 63M
70. KQL Exercise.mp4 62M
25. Responding to Incidents.mp4 62M
46. Cloud Alert Rules.mp4 56M
55. Microsoft Sentinel Workspaces.mp4 56M
78. Custom Workbooks.mp4 53M
57. Microsoft Sentinel Roles.mp4 53M
3. Microsoft 365 Defender Portal Endpoints.mp4 53M
5. Microsoft 365 Defender Portal Wrap-Up.mp4 52M
7. MS 365 Defender Policies & Rules Anti-Phishing.mp4 51M
40. Attack Simulation Training.mp4 50M
63. Ingesting Custom Logs.mp4 49M
62. Threat Intelligence Connectors.mp4 49M
6. MS 365 Defender Policies & Rules Built-In Rules.mp4 49M
14. Teams, Sharepoint and OneDrive Policies.mp4 48M
54. SIEMs and SOARs.mp4 47M
1. Getting to Know MS 365 Defender.mp4 44M
60. Configuring Data Connectors Via Policies.mp4 43M
18. Sensitivity Labels.mp4 43M
76. User and Entity Behavior Analytics (UEBA).mp4 42M
39. Cross-Domain Investigations.mp4 41M
9. MS 365 Defender Policies & Rules Anti-Malware, Safe Attachments & Safe Links.mp4 41M
71. Creating Playbooks.mp4 41M
11. MS 365 Defender Policies & Rules Additional Rules.mp4 40M
32. Using Secure Score.mp4 38M
72. Automation Rules.mp4 38M
79. Security Operations Efficiency Workbook.mp4 38M
80. Threat Hunting Queries.mp4 38M
20. Into to MS Defender for Endpoint.mp4 37M
43. Data Connectors.mp4 37M
44. Connect AWS Cloud Resources.mp4 36M
29. Azure Identity Policies.mp4 36M
4. Microsoft 365 Defender Portal Email & Collaboration.mp4 35M
35. Microsoft Defender for Cloud Apps.mp4 35M
38. Cloud App Policies.mp4 35M
13. Protecting Office 365.mp4 34M
17. DLP Policies and Alerts.mp4 34M
67. Custom Analytics Rules.mp4 33M
16. User Email Submissions.mp4 33M
26. Recommended Endpoint Configurations.mp4 33M
30. Conditional Access Policies.mp4 33M
68. Connector Provided Queries and Workflow.mp4 33M
52. Key Vault Alerts.mp4 32M
21. Automated Investigation and Response (AIR).mp4 32M
8. MS 365 Defender Policies & Rules Anti-SPAM.mp4 32M
45. Connect GCP Cloud Resources.mp4 31M
31. Investigating Azure Identity Events.mp4 31M
34. Investigating Defender for Identity Events.mp4 31M
82. Sentinel Bookmarks.mp4 30M
28. MS Defender for Endpoint.mp4 30M
19. Insider Risk Policies.mp4 30M
73. Defender Playbooks.mp4 28M
56. Setting Up Microsoft Sentinel.mp4 27M
22. Data Settings and Alert Notifications.mp4 27M
27. Threat Analytics.mp4 26M
66. Activate Microsoft Security Analytics Rules.mp4 25M
24. Custom Detection Alerts.mp4 25M
23. Attack Surface Reduction Rules.mp4 24M
49. Types of Alerts.mp4 24M
33. Tagging Sensitive Accounts.mp4 24M
81. Hunting With Livestreams.mp4 24M
53. Data Privacy.mp4 22M
12. MS 365 Defender Policies & Rules Alert and Activity Policies.mp4 21M
75. Multi-Workspace Incidents.mp4 21M
10. MS 365 Defender Policies & Rules AllowBlock Lists.mp4 19M
51. Threat Intelligence.mp4 18M
47. Intro Managing Defender for Cloud.mp4 18M
64. Intro to Sentinel Analytics Rules.mp4 9.3M