elhacker.INFO Downloads
Name Last modified Size
Parent Directory -
1. Getting to Know MS 365 Defender.mp4 2023-11-21 16:04 44M
2. Microsoft 365 Defender Portal Introduction.mp4 2023-11-21 16:05 86M
3. Microsoft 365 Defender Portal Endpoints.mp4 2023-11-21 16:07 53M
4. Microsoft 365 Defender Portal Email & Collaboration.mp4 2023-11-21 16:06 35M
5. Microsoft 365 Defender Portal Wrap-Up.mp4 2023-11-21 16:07 52M
6. MS 365 Defender Policies & Rules Built-In Rules.mp4 2023-11-21 16:10 49M
7. MS 365 Defender Policies & Rules Anti-Phishing.mp4 2023-11-21 16:11 51M
8. MS 365 Defender Policies & Rules Anti-SPAM.mp4 2023-11-21 16:11 32M
9. MS 365 Defender Policies & Rules Anti-Malware, Safe Attachments & Safe Links.mp4 2023-11-21 16:11 41M
10. MS 365 Defender Policies & Rules AllowBlock Lists.mp4 2023-11-21 16:04 19M
11. MS 365 Defender Policies & Rules Additional Rules.mp4 2023-11-21 16:04 40M
12. MS 365 Defender Policies & Rules Alert and Activity Policies.mp4 2023-11-21 16:04 21M
13. Protecting Office 365.mp4 2023-11-21 16:04 34M
14. Teams, Sharepoint and OneDrive Policies.mp4 2023-11-21 16:06 48M
15. Detect, Investigate, Respond and Remediate Threats.mp4 2023-11-21 16:06 114M
16. User Email Submissions.mp4 2023-11-21 16:06 33M
17. DLP Policies and Alerts.mp4 2023-11-21 16:06 34M
18. Sensitivity Labels.mp4 2023-11-21 16:05 43M
19. Insider Risk Policies.mp4 2023-11-21 16:05 30M
20. Into to MS Defender for Endpoint.mp4 2023-11-21 16:05 37M
21. Automated Investigation and Response (AIR).mp4 2023-11-21 16:05 32M
22. Data Settings and Alert Notifications.mp4 2023-11-21 16:05 27M
23. Attack Surface Reduction Rules.mp4 2023-11-21 16:05 24M
24. Custom Detection Alerts.mp4 2023-11-21 16:05 25M
25. Responding to Incidents.mp4 2023-11-21 16:04 62M
26. Recommended Endpoint Configurations.mp4 2023-11-21 16:05 33M
27. Threat Analytics.mp4 2023-11-21 16:05 26M
28. MS Defender for Endpoint.mp4 2023-11-21 16:05 30M
29. Azure Identity Policies.mp4 2023-11-21 16:04 36M
30. Conditional Access Policies.mp4 2023-11-21 16:04 33M
31. Investigating Azure Identity Events.mp4 2023-11-21 16:07 31M
32. Using Secure Score.mp4 2023-11-21 16:07 38M
33. Tagging Sensitive Accounts.mp4 2023-11-21 16:07 24M
34. Investigating Defender for Identity Events.mp4 2023-11-21 16:07 31M
35. Microsoft Defender for Cloud Apps.mp4 2023-11-21 16:07 35M
36. Discovering Cloud Apps.mp4 2023-11-21 16:07 76M
37. Investigating Cloud App Activity.mp4 2023-11-21 16:06 88M
38. Cloud App Policies.mp4 2023-11-21 16:06 35M
39. Cross-Domain Investigations.mp4 2023-11-21 16:07 41M
40. Attack Simulation Training.mp4 2023-11-21 16:08 50M
41. Microsoft Defender for Cloud.mp4 2023-11-21 16:08 63M
42. Data Retention and Recommendations.mp4 2023-11-21 16:08 66M
43. Data Connectors.mp4 2023-11-21 16:07 37M
44. Connect AWS Cloud Resources.mp4 2023-11-21 16:08 36M
45. Connect GCP Cloud Resources.mp4 2023-11-21 16:08 31M
46. Cloud Alert Rules.mp4 2023-11-21 16:07 56M
47. Intro Managing Defender for Cloud.mp4 2023-11-21 16:07 18M
48. Automated Responses.mp4 2023-11-21 16:09 91M
49. Types of Alerts.mp4 2023-11-21 16:07 24M
50. Managing Alerts.mp4 2023-11-21 16:09 98M
51. Threat Intelligence.mp4 2023-11-21 16:07 18M
52. Key Vault Alerts.mp4 2023-11-21 16:09 32M
53. Data Privacy.mp4 2023-11-21 16:09 22M
54. SIEMs and SOARs.mp4 2023-11-21 16:09 47M
55. Microsoft Sentinel Workspaces.mp4 2023-11-21 16:08 56M
56. Setting Up Microsoft Sentinel.mp4 2023-11-21 16:09 27M
57. Microsoft Sentinel Roles.mp4 2023-11-21 16:08 53M
58. Microsoft Sentinel Data Storage.mp4 2023-11-21 16:11 112M
59. Data Sources and Prerequisites.mp4 2023-11-21 16:08 66M
60. Configuring Data Connectors Via Policies.mp4 2023-11-21 16:11 43M
61. Syslog and CEF Event Collectors.mp4 2023-11-21 16:10 89M
62. Threat Intelligence Connectors.mp4 2023-11-21 16:10 49M
63. Ingesting Custom Logs.mp4 2023-11-21 16:10 49M
64. Intro to Sentinel Analytics Rules.mp4 2023-11-21 16:10 9.3M
65. Design and Configure Analytics Rules.mp4 2023-11-21 16:09 80M
66. Activate Microsoft Security Analytics Rules.mp4 2023-11-21 16:10 25M
67. Custom Analytics Rules.mp4 2023-11-21 16:10 33M
68. Connector Provided Queries and Workflow.mp4 2023-11-21 16:10 33M
69. Incident Creation Logic with KQL.mp4 2023-11-21 16:12 115M
70. KQL Exercise.mp4 2023-11-21 16:12 62M
71. Creating Playbooks.mp4 2023-11-21 16:13 41M
72. Automation Rules.mp4 2023-11-21 16:11 38M
73. Defender Playbooks.mp4 2023-11-21 16:12 28M
74. Incidents Within Sentinel.mp4 2023-11-21 16:12 86M
75. Multi-Workspace Incidents.mp4 2023-11-21 16:12 21M
76. User and Entity Behavior Analytics (UEBA).mp4 2023-11-21 16:12 42M
77. Sentinel Workbooks.mp4 2023-11-21 16:12 77M
78. Custom Workbooks.mp4 2023-11-21 16:12 53M
79. Security Operations Efficiency Workbook.mp4 2023-11-21 16:11 38M
80. Threat Hunting Queries.mp4 2023-11-21 16:11 38M
81. Hunting With Livestreams.mp4 2023-11-21 16:11 24M
82. Sentinel Bookmarks.mp4 2023-11-21 16:11 30M
83. Hunting With Notebooks.mp4 2023-11-21 16:13 118M