Please don't upload completely anonymously. Change the account setting instead.
  • U: Anonymous
  • D: 2018-02-24 02:37:16
  • C: Unknown

RELEASE >

ReScene version pyReScene Auto 0.6 XQZT File size CRC
Download
13,594
Stored files
1,510 CB280C3F
160 B52FC5AF
RAR-files
lmcssei-fe63-xqzt.rar 50,000,000 B5C137AD
lmcssei-fe63-xqzt.r00 50,000,000 9B8A0D09
lmcssei-fe63-xqzt.r01 50,000,000 0DC62E9A
lmcssei-fe63-xqzt.r02 50,000,000 C878B9A6
lmcssei-fe63-xqzt.r03 6,775,333 2830E2A7

Total size: 206,775,333
Archived files
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\Exercise Files\Ex_Files_Microsoft_Cybersecurity_SEI.zip [a657822b5e28507f] 103,378 264E2F69
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\5.4. Encrypting Data in Azure VMs\19.Microsoft Antimalware for Azure VMs.en.srt 8,527 91774A75
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\5.4. Encrypting Data in Azure VMs\18.Azure Data Encryption options for Azure infrastructure.mp4 [dbcaf26f3d7832f3] 5,856,874 E4D765CF
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\5.4. Encrypting Data in Azure VMs\21.Azure Storage Service Encryption for Data at Rest.mp4 [a44ba58bcb223a0a] 9,984,398 71042C74
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\5.4. Encrypting Data in Azure VMs\18.Azure Data Encryption options for Azure infrastructure.en.srt 5,987 B52EEF29
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\5.4. Encrypting Data in Azure VMs\20.Azure Disk Encryption for IaaS VMs.mp4 [681eb9188150b37] 21,355,756 E43CF019
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\5.4. Encrypting Data in Azure VMs\19.Microsoft Antimalware for Azure VMs.mp4 [e1e5345eae1b6551] 12,549,808 744F8985
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\5.4. Encrypting Data in Azure VMs\21.Azure Storage Service Encryption for Data at Rest.en.srt 6,444 99CE16AB
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\5.4. Encrypting Data in Azure VMs\20.Azure Disk Encryption for IaaS VMs.en.srt 12,548 73AE863B
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\2.1. Implementing Guarded Fabric in Windows Server 2016\07.Validate the HGS cluster.en.srt 8,159 58F56EA2
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\2.1. Implementing Guarded Fabric in Windows Server 2016\06.Deploy the Host Guardian Service.en.srt 11,887 3104E9A0
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\2.1. Implementing Guarded Fabric in Windows Server 2016\05.Plan your guarded fabric deployment.en.srt 9,039 06AD05D2
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\2.1. Implementing Guarded Fabric in Windows Server 2016\07.Validate the HGS cluster.mp4 [2eca76fc3dec7044] 12,172,353 105D535A
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\2.1. Implementing Guarded Fabric in Windows Server 2016\05.Plan your guarded fabric deployment.mp4 [75f0fca834aae9a5] 8,309,817 83F5EC1F
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\2.1. Implementing Guarded Fabric in Windows Server 2016\04.What is guarded fabric.en.srt 8,684 4B963496
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\2.1. Implementing Guarded Fabric in Windows Server 2016\04.What is guarded fabric.mp4 [f799510fa80c074f] 7,959,291 7A64F202
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\2.1. Implementing Guarded Fabric in Windows Server 2016\06.Deploy the Host Guardian Service.mp4 [874e29cb70822f2c] 19,273,431 E81A1E4C
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\1.Introduction\03.Documentation and lab requirements.en.srt 1,946 483CFB82
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\1.Introduction\01.Welcome.en.srt 2,501 57B95B59
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\1.Introduction\03.Documentation and lab requirements.mp4 [327ae21faf5a1586] 2,693,455 6CC32006
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\1.Introduction\02.What you should know.mp4 [e8743114c28b3973] 1,508,224 11F2D9A5
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\1.Introduction\02.What you should know.en.srt 997 75788042
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\1.Introduction\01.Welcome.mp4 [de7452a74a84fff3] 5,327,535 DD75391E
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\6.Conclusion\22.Next steps.mp4 [28b5bea477cc6834] 1,001,688 67DB29E3
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\6.Conclusion\22.Next steps.en.srt 747 1EC9CDB6
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\3.2. Shielding Virtual Machine Data\08.What is shielding data.en.srt 6,959 13AF3E9D
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\3.2. Shielding Virtual Machine Data\10.What types of VMs can a guarded fabric run.en.srt 3,193 34713D7E
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\3.2. Shielding Virtual Machine Data\11.How a shielded VM is powered on.en.srt 5,659 C9667D32
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\3.2. Shielding Virtual Machine Data\09.Which scenarios do shielding VMs protect against.mp4 [56e3278a8d79cf14] 12,047,200 D2FA224C
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\3.2. Shielding Virtual Machine Data\09.Which scenarios do shielding VMs protect against.en.srt 7,788 8690FE7A
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\3.2. Shielding Virtual Machine Data\10.What types of VMs can a guarded fabric run.mp4 [b7f9521cb315d286] 2,989,830 EDC04284
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\3.2. Shielding Virtual Machine Data\11.How a shielded VM is powered on.mp4 [6dc62b587e56adda] 7,751,854 DA0C0E42
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\3.2. Shielding Virtual Machine Data\08.What is shielding data.mp4 [1b2e46f1ba8ffb8b] 6,452,369 319A2F13
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\4.3. Preventing, Detecting, and Responding to Threats\13.Manage data collection.mp4 [474f53496c3f07e0] 7,153,105 315B8464
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\4.3. Preventing, Detecting, and Responding to Threats\15.Monitor security health of Azure resources.mp4 [6a7001514fc75561] 8,493,634 79AF954F
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\4.3. Preventing, Detecting, and Responding to Threats\14.Configure security policies.mp4 [e40ade5fbe2d22ea] 13,196,316 97197F19
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\4.3. Preventing, Detecting, and Responding to Threats\16.Manage and respond to security alerts.en.srt 5,855 54B895DA
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\4.3. Preventing, Detecting, and Responding to Threats\17.Monitor security health with Microsoft OMS.mp4 [c035c63d4b02336a] 19,078,852 A5A6853B
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\4.3. Preventing, Detecting, and Responding to Threats\14.Configure security policies.en.srt 8,538 B1F80FAE
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\4.3. Preventing, Detecting, and Responding to Threats\16.Manage and respond to security alerts.mp4 [c50f4ac3d721c4ca] 9,714,211 98BF2956
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\4.3. Preventing, Detecting, and Responding to Threats\12.Introduction to Azure Security Center data security.en.srt 7,964 3B86C29B
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\4.3. Preventing, Detecting, and Responding to Threats\12.Introduction to Azure Security Center data security.mp4 [dcab6b44c804a2c7] 11,637,368 2C77E605
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\4.3. Preventing, Detecting, and Responding to Threats\15.Monitor security health of Azure resources.en.srt 9,099 194B1CA0
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\4.3. Preventing, Detecting, and Responding to Threats\17.Monitor security health with Microsoft OMS.en.srt 13,520 3A2BD1C5
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\4.3. Preventing, Detecting, and Responding to Threats\13.Manage data collection.en.srt 8,355 5537C8E6
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\Exercise Files 0 00000000
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\5.4. Encrypting Data in Azure VMs 0 00000000
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\2.1. Implementing Guarded Fabric in Windows Server 2016 0 00000000
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\1.Introduction 0 00000000
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\6.Conclusion 0 00000000
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\3.2. Shielding Virtual Machine Data 0 00000000
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\4.3. Preventing, Detecting, and Responding to Threats 0 00000000
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure 0 00000000

Total size: 206,765,143
RAR Recovery
Not Present
Labels UNKNOWN