Download |
|
|
|
6,182 |
8A282AB5
|
|
600 |
6FBBCD08
|
|
RAR-files |
jgt-pgswel.rar |
15,000,000 |
0332888E |
jgt-pgswel.r00 |
15,000,000 |
D29DC0B7 |
jgt-pgswel.r01 |
15,000,000 |
4D3188CC |
jgt-pgswel.r02 |
15,000,000 |
C143338B |
jgt-pgswel.r03 |
15,000,000 |
2CBFACE6 |
jgt-pgswel.r04 |
15,000,000 |
9DF942E8 |
jgt-pgswel.r05 |
15,000,000 |
FC197257 |
jgt-pgswel.r06 |
15,000,000 |
DE21971A |
jgt-pgswel.r07 |
15,000,000 |
5A31DF05 |
jgt-pgswel.r08 |
15,000,000 |
D9B26855 |
jgt-pgswel.r09 |
15,000,000 |
3E6A47AC |
jgt-pgswel.r10 |
15,000,000 |
5DC49F20 |
jgt-pgswel.r11 |
15,000,000 |
79EE1B95 |
jgt-pgswel.r12 |
15,000,000 |
A50CDD8F |
jgt-pgswel.r13 |
15,000,000 |
224F2819 |
jgt-pgswel.r14 |
15,000,000 |
997E194F |
jgt-pgswel.r15 |
15,000,000 |
9009BBC1 |
jgt-pgswel.r16 |
15,000,000 |
FE14BD7A |
jgt-pgswel.r17 |
15,000,000 |
81D334CA |
jgt-pgswel.r18 |
15,000,000 |
2F5CDCB8 |
jgt-pgswel.r19 |
15,000,000 |
B3B8661D |
jgt-pgswel.r20 |
15,000,000 |
CDBA1DCF |
jgt-pgswel.r21 |
15,000,000 |
0CE5300D |
jgt-pgswel.r22 |
8,949,165 |
09DD03FC |
|
Total size: |
353,949,165 |
|
|
Archived
files |
Pluralsight Getting Started with Endpoint Log Analysis\01.Course Overview\0101.Course Overview.mp4
[84feb0b1a7996105]
|
5,510,643 |
9C6FFE56 |
Pluralsight Getting Started with Endpoint Log Analysis\02.Course Introduction\0201.Introduction.mp4
[c9a6afd7e1549c64]
|
7,788,999 |
707C9484 |
Pluralsight Getting Started with Endpoint Log Analysis\02.Course Introduction\0202.Course Overview.mp4
[46f5288e16bf5def]
|
6,852,994 |
65C8D584 |
Pluralsight Getting Started with Endpoint Log Analysis\02.Course Introduction\0203.What is Machine Data.mp4
[f307e117a07bb171]
|
6,679,097 |
2ED2E52D |
Pluralsight Getting Started with Endpoint Log Analysis\02.Course Introduction\0204.Summary.mp4
[58de9ba4f60a7a8b]
|
3,832,626 |
8AD1D7D9 |
Pluralsight Getting Started with Endpoint Log Analysis\03.Inspecting Machine Data\0301.Introduction.mp4
[3c57c4c9906f1feb]
|
2,349,524 |
468D64A4 |
Pluralsight Getting Started with Endpoint Log Analysis\03.Inspecting Machine Data\0302.Machine Data Structures.mp4
[a58a54e8fc6857d3]
|
13,798,908 |
B820F615 |
Pluralsight Getting Started with Endpoint Log Analysis\03.Inspecting Machine Data\0303.Baselining Machine Data.mp4
[773b13cfa84fdff9]
|
4,813,072 |
53F22429 |
Pluralsight Getting Started with Endpoint Log Analysis\03.Inspecting Machine Data\0304.Malicious Data Identifiers.mp4
[cd540fa6b0395d59]
|
9,025,832 |
42324329 |
Pluralsight Getting Started with Endpoint Log Analysis\03.Inspecting Machine Data\0305.Demo Recognizing Recon Activity.mp4
[c9b3680ab4e7ba45]
|
23,763,579 |
15E59516 |
Pluralsight Getting Started with Endpoint Log Analysis\03.Inspecting Machine Data\0306.Summary.mp4
[67413e8bedcd9c3e]
|
3,291,731 |
B1DBE168 |
Pluralsight Getting Started with Endpoint Log Analysis\04.Analyzing Machine Data\0401.Introduction.mp4
[3a47e5b21b6b81be]
|
3,430,834 |
D4E832C6 |
Pluralsight Getting Started with Endpoint Log Analysis\04.Analyzing Machine Data\0402.Authentication Data.mp4
[bdcf76d73b35370c]
|
11,411,568 |
D8FACB84 |
Pluralsight Getting Started with Endpoint Log Analysis\04.Analyzing Machine Data\0403.Normal Authentication Trends.mp4
[ff4c971434df51bb]
|
16,816,689 |
FC1B99C2 |
Pluralsight Getting Started with Endpoint Log Analysis\04.Analyzing Machine Data\0404.Analyzing Machine Data.mp4
[96e5705be336bd39]
|
12,711,873 |
9654845A |
Pluralsight Getting Started with Endpoint Log Analysis\04.Analyzing Machine Data\0405.Demo Analyzing Machine Data.mp4
[9615fc895291ebc6]
|
40,915,769 |
BA093113 |
Pluralsight Getting Started with Endpoint Log Analysis\04.Analyzing Machine Data\0406.Summary.mp4
[d5bfe96f1a503981]
|
1,318,633 |
9A8114E8 |
Pluralsight Getting Started with Endpoint Log Analysis\05.Searching Machine Data\0501.Introduction.mp4
[9a3cbfb9da763bde]
|
2,428,070 |
8F8E13A8 |
Pluralsight Getting Started with Endpoint Log Analysis\05.Searching Machine Data\0502.Searching Machine Data.mp4
[fd6713e1e0c40132]
|
17,445,901 |
FBCEB0E8 |
Pluralsight Getting Started with Endpoint Log Analysis\05.Searching Machine Data\0503.Filtering Techniques.mp4
[61c942a793e2970a]
|
20,555,084 |
D134FFA7 |
Pluralsight Getting Started with Endpoint Log Analysis\05.Searching Machine Data\0504.Crafted Queries.mp4
[d674072b17ad25f5]
|
6,894,384 |
F9689018 |
Pluralsight Getting Started with Endpoint Log Analysis\05.Searching Machine Data\0505.Demo Searching Machine Data.mp4
[df6303c701704f1f]
|
22,738,337 |
C12C8F4C |
Pluralsight Getting Started with Endpoint Log Analysis\05.Searching Machine Data\0506.Summary.mp4
[58c23537bb7a5934]
|
1,481,841 |
1DA5D55E |
Pluralsight Getting Started with Endpoint Log Analysis\06.Case Study Using Machine Data to Track Attacker Activity\0601.Case Study Introduction.mp4
[18d2085f1fd724aa]
|
2,907,110 |
D0008AEB |
Pluralsight Getting Started with Endpoint Log Analysis\06.Case Study Using Machine Data to Track Attacker Activity\0602.Demo Track the Attack.mp4
[60cf3d1f908a18ab]
|
53,886,872 |
2A1CB425 |
Pluralsight Getting Started with Endpoint Log Analysis\06.Case Study Using Machine Data to Track Attacker Activity\0603.Summary.mp4
[ab23c1463ae1a40b]
|
8,246,621 |
CCC1BE23 |
Pluralsight Getting Started with Endpoint Log Analysis\07.Course Summary\0701.Course Summary.mp4
[28f4c31653bbae72]
|
2,886,223 |
7B0C9B4C |
Pluralsight Getting Started with Endpoint Log Analysis\07.Course Summary\0702.Let's Wrap!.mp4
[15378294d68fed80]
|
6,656,017 |
53F6CAD3 |
Pluralsight Getting Started with Endpoint Log Analysis\Exercise Files\getting-started-endpoint-log-analysis.zip |
29,992,180 |
C1BBE124 |
Pluralsight Getting Started with Endpoint Log Analysis\01.Course Overview |
0 |
00000000 |
Pluralsight Getting Started with Endpoint Log Analysis\02.Course Introduction |
0 |
00000000 |
Pluralsight Getting Started with Endpoint Log Analysis\03.Inspecting Machine Data |
0 |
00000000 |
Pluralsight Getting Started with Endpoint Log Analysis\04.Analyzing Machine Data |
0 |
00000000 |
Pluralsight Getting Started with Endpoint Log Analysis\05.Searching Machine Data |
0 |
00000000 |
Pluralsight Getting Started with Endpoint Log Analysis\06.Case Study Using Machine Data to Track Attacker Activity |
0 |
00000000 |
Pluralsight Getting Started with Endpoint Log Analysis\07.Course Summary |
0 |
00000000 |
Pluralsight Getting Started with Endpoint Log Analysis\Exercise Files |
0 |
00000000 |
Pluralsight Getting Started with Endpoint Log Analysis |
0 |
00000000 |
|
Total size: |
350,431,011 |
|
|
RAR Recovery |
Present (Protect+) |
3,507,048 |
|
|
Labels
|
APPS |