Pluralsight - Active Defense with PowerShell 2023-2
File List
- powershell-active-defense.zip 27.8 MB
- 4. Enforcing Secure Configurations/2. Get-CimInstance.mp4 22.7 MB
- 4. Enforcing Secure Configurations/6. Windows Defender.mp4 16.9 MB
- 4. Enforcing Secure Configurations/3. Invoke-CimMethod.mp4 16.4 MB
- 3. Setting the Trap/4. Monitor for Bad Credentials.mp4 14.3 MB
- 3. Setting the Trap/2. Honeypot - Create a Honeyport.mp4 12.6 MB
- 4. Enforcing Secure Configurations/4. Get-ItemProperty.mp4 11.1 MB
- 3. Setting the Trap/5. Maintain the Look of an Active User.mp4 9.8 MB
- 4. Enforcing Secure Configurations/1. Execution Policy.mp4 8.7 MB
- 2. Active Defense Principles/4. Tools for the Course.mp4 8.6 MB
- 3. Setting the Trap/3. Honeypot - Create a Honeytoken.mp4 6.8 MB
- 4. Enforcing Secure Configurations/5. Get-WindowsFeature.mp4 6.5 MB
- 2. Active Defense Principles/2. What Does Active Defense Mean.mp4 5.9 MB
- 1. Course Overview/1. Course Overview.mp4 4.3 MB
- 3. Setting the Trap/6. Review Attack Patterns.mp4 4.3 MB
- 2. Active Defense Principles/3. Why the Use of PowerShell for Active Defense.mp4 4.1 MB
- 4. Enforcing Secure Configurations/7. Summary.mp4 3.1 MB
- 2. Active Defense Principles/1. Overview.mp4 2.9 MB
- 3. Setting the Trap/1. What Kind of Traps Can Be Set.mp4 2.8 MB
- 4. Enforcing Secure Configurations/6. Windows Defender.vtt 9.7 KB
- 4. Enforcing Secure Configurations/2. Get-CimInstance.vtt 9.4 KB
- 3. Setting the Trap/2. Honeypot - Create a Honeyport.vtt 6.9 KB
- 4. Enforcing Secure Configurations/3. Invoke-CimMethod.vtt 6.8 KB
- 3. Setting the Trap/5. Maintain the Look of an Active User.vtt 6.8 KB
- 2. Active Defense Principles/4. Tools for the Course.vtt 6.1 KB
- 4. Enforcing Secure Configurations/4. Get-ItemProperty.vtt 6.0 KB
- 3. Setting the Trap/4. Monitor for Bad Credentials.vtt 6.0 KB
- 4. Enforcing Secure Configurations/1. Execution Policy.vtt 5.2 KB
- 4. Enforcing Secure Configurations/5. Get-WindowsFeature.vtt 4.5 KB
- 3. Setting the Trap/3. Honeypot - Create a Honeytoken.vtt 4.5 KB
- 2. Active Defense Principles/2. What Does Active Defense Mean.vtt 4.2 KB
- 2. Active Defense Principles/3. Why the Use of PowerShell for Active Defense.vtt 3.3 KB
- 4. Enforcing Secure Configurations/7. Summary.vtt 3.2 KB
- 3. Setting the Trap/1. What Kind of Traps Can Be Set.vtt 2.9 KB
- 3. Setting the Trap/6. Review Attack Patterns.vtt 2.5 KB
- 1. Course Overview/1. Course Overview.vtt 2.4 KB
- 2. Active Defense Principles/1. Overview.vtt 2.1 KB
- Read me.txt 123 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.