RAR-files |
llmcssei-0b04-xqzt.rar |
50,000,000 |
CCBB7DE0 |
llmcssei-0b04-xqzt.r00 |
50,000,000 |
4FF89684 |
llmcssei-0b04-xqzt.r01 |
50,000,000 |
A56C4E6B |
llmcssei-0b04-xqzt.r02 |
50,000,000 |
06253745 |
llmcssei-0b04-xqzt.r03 |
50,000,000 |
6D091287 |
llmcssei-0b04-xqzt.r04 |
50,000,000 |
1188A7C9 |
llmcssei-0b04-xqzt.r05 |
27,630,937 |
D1CC5A7D |
|
Total size: |
327,630,937 |
|
|
Archived
files |
Microsoft Cybersecurity Stack - Securing Enterprise Information\2.1. Securing Corporate Information on Any Device\07.Work with the AIP client.mp4
[fd8dc651037db0a2]
|
17,481,786 |
82C891E8 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\2.1. Securing Corporate Information on Any Device\04.What is Azure Information Protection (AIP).mp4
[ca315e4a45a7ae1e]
|
12,617,779 |
44A11D61 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\2.1. Securing Corporate Information on Any Device\06.Create RMS templates.mp4
[dab83087b282fed1]
|
18,990,382 |
8763C43C |
Microsoft Cybersecurity Stack - Securing Enterprise Information\2.1. Securing Corporate Information on Any Device\09.Classify and protect data in bulk.mp4
[dfc4c2ed6787b9b0]
|
9,869,487 |
2AA3B0CC |
Microsoft Cybersecurity Stack - Securing Enterprise Information\2.1. Securing Corporate Information on Any Device\08.Introducing the unified labeling experience.mp4
[1b1bd9144d66697b]
|
17,680,556 |
5B0841EF |
Microsoft Cybersecurity Stack - Securing Enterprise Information\2.1. Securing Corporate Information on Any Device\05.Configure classification and labeling.mp4
[679f6929f85efbeb]
|
13,657,143 |
A12425FC |
Microsoft Cybersecurity Stack - Securing Enterprise Information\5.4. Securing Collaboration and DLP\23.Audit sharing activity in SharePoint.mp4
[33bb0d8c7134bc74]
|
8,040,054 |
16B01C18 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\5.4. Securing Collaboration and DLP\24.Secure email sharing with anyone, anywhere.mp4
[b5c8353a33970e4b]
|
11,788,855 |
856D56B4 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\5.4. Securing Collaboration and DLP\20.Information Rights Management (IRM) in SharePoint.mp4
[87e51e34979c3965]
|
7,046,171 |
F0656D2F |
Microsoft Cybersecurity Stack - Securing Enterprise Information\5.4. Securing Collaboration and DLP\21.Configure built-in IRM options.mp4
[4b193fe0b5d1a5dc]
|
20,093,860 |
17441343 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\5.4. Securing Collaboration and DLP\22.Using SharePoint security policies.mp4
[6854864c87ac3aaa]
|
9,558,572 |
126661C3 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\7.Conclusion\30.Next steps.mp4
[ed5c476d93013bb]
|
2,651,998 |
B6ABC42D |
Microsoft Cybersecurity Stack - Securing Enterprise Information\3.2. Securing Corporate Data on Mobile Devices\12.Secure sharing from mobile devices.mp4
[5f885e85b6c674c7]
|
4,413,007 |
531DB49D |
Microsoft Cybersecurity Stack - Securing Enterprise Information\3.2. Securing Corporate Data on Mobile Devices\11.Data loss prevention (DLP) on mobile devices.mp4
[b7130dfca28699c1]
|
14,997,263 |
E90019A3 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\3.2. Securing Corporate Data on Mobile Devices\10.Challenges of securing data on mobile devices.mp4
[a7c851ac9eb5dc0b]
|
8,837,604 |
01E3628A |
Microsoft Cybersecurity Stack - Securing Enterprise Information\3.2. Securing Corporate Data on Mobile Devices\13.Implement DLP for unmanaged mobile devices.mp4
[d34410a8415de255]
|
14,488,871 |
F1EDB91C |
Microsoft Cybersecurity Stack - Securing Enterprise Information\1.Introduction\01.Welcome.mp4
[13e4f6db333203aa]
|
4,706,149 |
084FADED |
Microsoft Cybersecurity Stack - Securing Enterprise Information\1.Introduction\03.Lab requirements.mp4
[a6c41bf891c19bcd]
|
1,188,090 |
D5CBC693 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\1.Introduction\02.What you should know.mp4
[94bfc92dbda3f613]
|
773,538 |
D389E9FB |
Microsoft Cybersecurity Stack - Securing Enterprise Information\4.3. Identifying and Controlling Shadow IT\17.Configure automatic log upload.mp4
[df6b4acad5cd3d34]
|
10,505,686 |
808ED203 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\4.3. Identifying and Controlling Shadow IT\14.What is Cloud App Security (CAS).mp4
[10610dda4b42bdab]
|
12,104,877 |
3323B89C |
Microsoft Cybersecurity Stack - Securing Enterprise Information\4.3. Identifying and Controlling Shadow IT\16.Customize discovery and anonymize discovery data.mp4
[b19aaefb6c2ae5c3]
|
7,607,599 |
31172F5C |
Microsoft Cybersecurity Stack - Securing Enterprise Information\4.3. Identifying and Controlling Shadow IT\19.Integration with other Microsoft cloud services.mp4
[a87977c9ea3530ce]
|
17,408,004 |
ECC1F660 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\4.3. Identifying and Controlling Shadow IT\18.Connect apps to CAS.mp4
[b667136c3e64d881]
|
12,911,411 |
013DDD13 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\4.3. Identifying and Controlling Shadow IT\15.Deploy Cloud Discovery.mp4
[ff34a3c15fe3d0e4]
|
9,851,275 |
786F4C89 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\6.5. Securing Structured (SQL) Data\25.Secure structured data at rest.mp4
[6d5c4490c90bb843]
|
13,589,559 |
CF9BF6B0 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\6.5. Securing Structured (SQL) Data\28.Configure dynamic data masking.mp4
[3ad35fe680c63257]
|
9,325,536 |
75B4E2CD |
Microsoft Cybersecurity Stack - Securing Enterprise Information\6.5. Securing Structured (SQL) Data\29.Protect Azure SQL with SQL Threat Detection.mp4
[1e0cd1f71a39ed7a]
|
7,825,106 |
230A1B94 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\6.5. Securing Structured (SQL) Data\26.What is SQL 'Always Encrypted'.mp4
[56a287486130d8be]
|
12,549,603 |
D5A1EE06 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\6.5. Securing Structured (SQL) Data\27.Using row-level security.mp4
[c462a758064f6c18]
|
15,063,471 |
BB78733C |
Microsoft Cybersecurity Stack - Securing Enterprise Information\2.1. Securing Corporate Information on Any Device |
0 |
00000000 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\5.4. Securing Collaboration and DLP |
0 |
00000000 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\7.Conclusion |
0 |
00000000 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\3.2. Securing Corporate Data on Mobile Devices |
0 |
00000000 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\1.Introduction |
0 |
00000000 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\4.3. Identifying and Controlling Shadow IT |
0 |
00000000 |
Microsoft Cybersecurity Stack - Securing Enterprise Information\6.5. Securing Structured (SQL) Data |
0 |
00000000 |
Microsoft Cybersecurity Stack - Securing Enterprise Information |
0 |
00000000 |
|
Total size: |
327,623,292 |
|
|