Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\Exercise Files\Ex_Files_Microsoft_Cybersecurity_SEI.zip
[a657822b5e28507f]
|
103,378 |
264E2F69 |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\5.4. Encrypting Data in Azure VMs\19.Microsoft Antimalware for Azure VMs.en.srt |
8,527 |
91774A75 |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\5.4. Encrypting Data in Azure VMs\18.Azure Data Encryption options for Azure infrastructure.mp4
[dbcaf26f3d7832f3]
|
5,856,874 |
E4D765CF |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\5.4. Encrypting Data in Azure VMs\21.Azure Storage Service Encryption for Data at Rest.mp4
[a44ba58bcb223a0a]
|
9,984,398 |
71042C74 |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\5.4. Encrypting Data in Azure VMs\18.Azure Data Encryption options for Azure infrastructure.en.srt |
5,987 |
B52EEF29 |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\5.4. Encrypting Data in Azure VMs\20.Azure Disk Encryption for IaaS VMs.mp4
[681eb9188150b37]
|
21,355,756 |
E43CF019 |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\5.4. Encrypting Data in Azure VMs\19.Microsoft Antimalware for Azure VMs.mp4
[e1e5345eae1b6551]
|
12,549,808 |
744F8985 |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\5.4. Encrypting Data in Azure VMs\21.Azure Storage Service Encryption for Data at Rest.en.srt |
6,444 |
99CE16AB |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\5.4. Encrypting Data in Azure VMs\20.Azure Disk Encryption for IaaS VMs.en.srt |
12,548 |
73AE863B |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\2.1. Implementing Guarded Fabric in Windows Server 2016\07.Validate the HGS cluster.en.srt |
8,159 |
58F56EA2 |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\2.1. Implementing Guarded Fabric in Windows Server 2016\06.Deploy the Host Guardian Service.en.srt |
11,887 |
3104E9A0 |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\2.1. Implementing Guarded Fabric in Windows Server 2016\05.Plan your guarded fabric deployment.en.srt |
9,039 |
06AD05D2 |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\2.1. Implementing Guarded Fabric in Windows Server 2016\07.Validate the HGS cluster.mp4
[2eca76fc3dec7044]
|
12,172,353 |
105D535A |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\2.1. Implementing Guarded Fabric in Windows Server 2016\05.Plan your guarded fabric deployment.mp4
[75f0fca834aae9a5]
|
8,309,817 |
83F5EC1F |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\2.1. Implementing Guarded Fabric in Windows Server 2016\04.What is guarded fabric.en.srt |
8,684 |
4B963496 |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\2.1. Implementing Guarded Fabric in Windows Server 2016\04.What is guarded fabric.mp4
[f799510fa80c074f]
|
7,959,291 |
7A64F202 |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\2.1. Implementing Guarded Fabric in Windows Server 2016\06.Deploy the Host Guardian Service.mp4
[874e29cb70822f2c]
|
19,273,431 |
E81A1E4C |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\1.Introduction\03.Documentation and lab requirements.en.srt |
1,946 |
483CFB82 |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\1.Introduction\01.Welcome.en.srt |
2,501 |
57B95B59 |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\1.Introduction\03.Documentation and lab requirements.mp4
[327ae21faf5a1586]
|
2,693,455 |
6CC32006 |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\1.Introduction\02.What you should know.mp4
[e8743114c28b3973]
|
1,508,224 |
11F2D9A5 |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\1.Introduction\02.What you should know.en.srt |
997 |
75788042 |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\1.Introduction\01.Welcome.mp4
[de7452a74a84fff3]
|
5,327,535 |
DD75391E |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\6.Conclusion\22.Next steps.mp4
[28b5bea477cc6834]
|
1,001,688 |
67DB29E3 |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\6.Conclusion\22.Next steps.en.srt |
747 |
1EC9CDB6 |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\3.2. Shielding Virtual Machine Data\08.What is shielding data.en.srt |
6,959 |
13AF3E9D |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\3.2. Shielding Virtual Machine Data\10.What types of VMs can a guarded fabric run.en.srt |
3,193 |
34713D7E |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\3.2. Shielding Virtual Machine Data\11.How a shielded VM is powered on.en.srt |
5,659 |
C9667D32 |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\3.2. Shielding Virtual Machine Data\09.Which scenarios do shielding VMs protect against.mp4
[56e3278a8d79cf14]
|
12,047,200 |
D2FA224C |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\3.2. Shielding Virtual Machine Data\09.Which scenarios do shielding VMs protect against.en.srt |
7,788 |
8690FE7A |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\3.2. Shielding Virtual Machine Data\10.What types of VMs can a guarded fabric run.mp4
[b7f9521cb315d286]
|
2,989,830 |
EDC04284 |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\3.2. Shielding Virtual Machine Data\11.How a shielded VM is powered on.mp4
[6dc62b587e56adda]
|
7,751,854 |
DA0C0E42 |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\3.2. Shielding Virtual Machine Data\08.What is shielding data.mp4
[1b2e46f1ba8ffb8b]
|
6,452,369 |
319A2F13 |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\4.3. Preventing, Detecting, and Responding to Threats\13.Manage data collection.mp4
[474f53496c3f07e0]
|
7,153,105 |
315B8464 |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\4.3. Preventing, Detecting, and Responding to Threats\15.Monitor security health of Azure resources.mp4
[6a7001514fc75561]
|
8,493,634 |
79AF954F |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\4.3. Preventing, Detecting, and Responding to Threats\14.Configure security policies.mp4
[e40ade5fbe2d22ea]
|
13,196,316 |
97197F19 |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\4.3. Preventing, Detecting, and Responding to Threats\16.Manage and respond to security alerts.en.srt |
5,855 |
54B895DA |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\4.3. Preventing, Detecting, and Responding to Threats\17.Monitor security health with Microsoft OMS.mp4
[c035c63d4b02336a]
|
19,078,852 |
A5A6853B |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\4.3. Preventing, Detecting, and Responding to Threats\14.Configure security policies.en.srt |
8,538 |
B1F80FAE |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\4.3. Preventing, Detecting, and Responding to Threats\16.Manage and respond to security alerts.mp4
[c50f4ac3d721c4ca]
|
9,714,211 |
98BF2956 |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\4.3. Preventing, Detecting, and Responding to Threats\12.Introduction to Azure Security Center data security.en.srt |
7,964 |
3B86C29B |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\4.3. Preventing, Detecting, and Responding to Threats\12.Introduction to Azure Security Center data security.mp4
[dcab6b44c804a2c7]
|
11,637,368 |
2C77E605 |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\4.3. Preventing, Detecting, and Responding to Threats\15.Monitor security health of Azure resources.en.srt |
9,099 |
194B1CA0 |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\4.3. Preventing, Detecting, and Responding to Threats\17.Monitor security health with Microsoft OMS.en.srt |
13,520 |
3A2BD1C5 |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\4.3. Preventing, Detecting, and Responding to Threats\13.Manage data collection.en.srt |
8,355 |
5537C8E6 |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\Exercise Files |
0 |
00000000 |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\5.4. Encrypting Data in Azure VMs |
0 |
00000000 |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\2.1. Implementing Guarded Fabric in Windows Server 2016 |
0 |
00000000 |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\1.Introduction |
0 |
00000000 |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\6.Conclusion |
0 |
00000000 |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\3.2. Shielding Virtual Machine Data |
0 |
00000000 |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure\4.3. Preventing, Detecting, and Responding to Threats |
0 |
00000000 |
Microsoft Cybersecurity Stack - Securing Enterprise Infrastructure |
0 |
00000000 |
|
Total size: |
206,765,143 |
|