RAR-files |
jgt-tuning-creating-correlation-searches-splunk-enterprise-security.rar |
15,000,000 |
A9B7DE9C |
jgt-tuning-creating-correlation-searches-splunk-enterprise-security.r00 |
15,000,000 |
DDC7D7F1 |
jgt-tuning-creating-correlation-searches-splunk-enterprise-security.r01 |
15,000,000 |
83C4F1FF |
jgt-tuning-creating-correlation-searches-splunk-enterprise-security.r02 |
15,000,000 |
2C0F3B7D |
jgt-tuning-creating-correlation-searches-splunk-enterprise-security.r03 |
15,000,000 |
3B5634B9 |
jgt-tuning-creating-correlation-searches-splunk-enterprise-security.r04 |
15,000,000 |
1CC8C5EF |
jgt-tuning-creating-correlation-searches-splunk-enterprise-security.r05 |
15,000,000 |
92A7FAB0 |
jgt-tuning-creating-correlation-searches-splunk-enterprise-security.r06 |
15,000,000 |
8393CA53 |
jgt-tuning-creating-correlation-searches-splunk-enterprise-security.r07 |
15,000,000 |
35445A29 |
jgt-tuning-creating-correlation-searches-splunk-enterprise-security.r08 |
15,000,000 |
FDEA1BAB |
jgt-tuning-creating-correlation-searches-splunk-enterprise-security.r09 |
15,000,000 |
C2A45887 |
jgt-tuning-creating-correlation-searches-splunk-enterprise-security.r10 |
15,000,000 |
560E4832 |
jgt-tuning-creating-correlation-searches-splunk-enterprise-security.r11 |
15,000,000 |
4BC1F2C0 |
jgt-tuning-creating-correlation-searches-splunk-enterprise-security.r12 |
15,000,000 |
267751A4 |
jgt-tuning-creating-correlation-searches-splunk-enterprise-security.r13 |
15,000,000 |
DF731FD5 |
jgt-tuning-creating-correlation-searches-splunk-enterprise-security.r14 |
15,000,000 |
43DEE80A |
jgt-tuning-creating-correlation-searches-splunk-enterprise-security.r15 |
15,000,000 |
A32AF4ED |
jgt-tuning-creating-correlation-searches-splunk-enterprise-security.r16 |
15,000,000 |
C90529C8 |
jgt-tuning-creating-correlation-searches-splunk-enterprise-security.r17 |
15,000,000 |
50C47034 |
jgt-tuning-creating-correlation-searches-splunk-enterprise-security.r18 |
15,000,000 |
66F401D2 |
jgt-tuning-creating-correlation-searches-splunk-enterprise-security.r19 |
15,000,000 |
EAD31683 |
jgt-tuning-creating-correlation-searches-splunk-enterprise-security.r20 |
15,000,000 |
A5D1AFF6 |
jgt-tuning-creating-correlation-searches-splunk-enterprise-security.r21 |
15,000,000 |
58AAF27A |
jgt-tuning-creating-correlation-searches-splunk-enterprise-security.r22 |
15,000,000 |
6BC4D69B |
jgt-tuning-creating-correlation-searches-splunk-enterprise-security.r23 |
15,000,000 |
5E48834D |
jgt-tuning-creating-correlation-searches-splunk-enterprise-security.r24 |
15,000,000 |
FAD6E828 |
jgt-tuning-creating-correlation-searches-splunk-enterprise-security.r25 |
15,000,000 |
5ACDF141 |
jgt-tuning-creating-correlation-searches-splunk-enterprise-security.r26 |
15,000,000 |
D845D46A |
jgt-tuning-creating-correlation-searches-splunk-enterprise-security.r27 |
15,000,000 |
FFC2AB9D |
jgt-tuning-creating-correlation-searches-splunk-enterprise-security.r28 |
15,000,000 |
3F2DC16A |
jgt-tuning-creating-correlation-searches-splunk-enterprise-security.r29 |
15,000,000 |
56173D7C |
jgt-tuning-creating-correlation-searches-splunk-enterprise-security.r30 |
15,000,000 |
A8CB913F |
jgt-tuning-creating-correlation-searches-splunk-enterprise-security.r31 |
15,000,000 |
41A8600E |
jgt-tuning-creating-correlation-searches-splunk-enterprise-security.r32 |
1,498,916 |
DCC11D3F |
|
Total size: |
496,498,916 |
|
|
Archived
files |
Pluralsight Tuning and Creating Correlation Searches in Splunk Enterprise Security\01.Course Overview\01.01.Course Overview.mp4 |
17,748,516 |
01B81E8F |
Pluralsight Tuning and Creating Correlation Searches in Splunk Enterprise Security\02.The Anatomy and Functions of Correlation Searches\02.01.Overview.mp4 |
4,856,040 |
62BB3324 |
Pluralsight Tuning and Creating Correlation Searches in Splunk Enterprise Security\02.The Anatomy and Functions of Correlation Searches\02.02.Setting up the Demo Environment.mp4 |
10,799,284 |
FD55B6AB |
Pluralsight Tuning and Creating Correlation Searches in Splunk Enterprise Security\02.The Anatomy and Functions of Correlation Searches\02.03.What Are Correlation Searches.mp4 |
5,953,960 |
0EC918A5 |
Pluralsight Tuning and Creating Correlation Searches in Splunk Enterprise Security\02.The Anatomy and Functions of Correlation Searches\02.04.Components and Functions of Correlation Searches.mp4 |
3,586,852 |
211E683A |
Pluralsight Tuning and Creating Correlation Searches in Splunk Enterprise Security\02.The Anatomy and Functions of Correlation Searches\02.05.Demo Exploring, Enabling and Running Correlation Searches.mp4 |
20,987,944 |
8FD910BF |
Pluralsight Tuning and Creating Correlation Searches in Splunk Enterprise Security\02.The Anatomy and Functions of Correlation Searches\02.06.Summary.mp4 |
1,424,852 |
DA756DC8 |
Pluralsight Tuning and Creating Correlation Searches in Splunk Enterprise Security\03.Tuning Correlation Searches\03.01.Overview.mp4 |
1,962,532 |
E0E7521F |
Pluralsight Tuning and Creating Correlation Searches in Splunk Enterprise Security\03.Tuning Correlation Searches\03.02.Correlation Search Life-cycle.mp4 |
3,153,324 |
B6017DF4 |
Pluralsight Tuning and Creating Correlation Searches in Splunk Enterprise Security\03.Tuning Correlation Searches\03.03.Components of a Correlation Search.mp4 |
14,039,276 |
6487374D |
Pluralsight Tuning and Creating Correlation Searches in Splunk Enterprise Security\03.Tuning Correlation Searches\03.04.Demo Components of a Correlation Search.mp4 |
13,174,852 |
C6C96434 |
Pluralsight Tuning and Creating Correlation Searches in Splunk Enterprise Security\03.Tuning Correlation Searches\03.05.Demo Dissecting Risk Analysis and Notable Response Actions.mp4 |
30,219,872 |
29CAA88A |
Pluralsight Tuning and Creating Correlation Searches in Splunk Enterprise Security\03.Tuning Correlation Searches\03.06.Demo Cloning a Correlation Search and Adding Incident Review Attributes.mp4 |
25,414,780 |
DB89CB9C |
Pluralsight Tuning and Creating Correlation Searches in Splunk Enterprise Security\03.Tuning Correlation Searches\03.07.Understanding Thresholds in Correlation Searches.mp4 |
4,689,848 |
35DD33AF |
Pluralsight Tuning and Creating Correlation Searches in Splunk Enterprise Security\03.Tuning Correlation Searches\03.08.Demo Understanding Thresholds in Correlation Searches.mp4 |
14,071,988 |
37B9D8B6 |
Pluralsight Tuning and Creating Correlation Searches in Splunk Enterprise Security\03.Tuning Correlation Searches\03.09.Summary.mp4 |
3,498,492 |
A0C8CF17 |
Pluralsight Tuning and Creating Correlation Searches in Splunk Enterprise Security\04.Creating Correlation Searches\04.01.Overview.mp4 |
2,312,212 |
C7F46194 |
Pluralsight Tuning and Creating Correlation Searches in Splunk Enterprise Security\04.Creating Correlation Searches\04.02.Defining Use-case and Planning the Correlation Search.mp4 |
4,327,948 |
C8E0C777 |
Pluralsight Tuning and Creating Correlation Searches in Splunk Enterprise Security\04.Creating Correlation Searches\04.03.Demo (Part 1) Designing, Developing, Testing and Deploying a Correlation Search.mp4 |
31,670,480 |
11751FEF |
Pluralsight Tuning and Creating Correlation Searches in Splunk Enterprise Security\04.Creating Correlation Searches\04.04.Demo (Part 2) Designing, Developing, Testing and Deploying a Correlation Search.mp4 |
28,988,660 |
64B447FE |
Pluralsight Tuning and Creating Correlation Searches in Splunk Enterprise Security\04.Creating Correlation Searches\04.05.Adaptive Response Actions Overview.mp4 |
15,342,116 |
39CE887B |
Pluralsight Tuning and Creating Correlation Searches in Splunk Enterprise Security\04.Creating Correlation Searches\04.06.Summary.mp4 |
2,689,904 |
89333F94 |
Pluralsight Tuning and Creating Correlation Searches in Splunk Enterprise Security\05.Importing and Exporting Correlation Searches\05.01.Overview.mp4 |
2,581,428 |
0FABA5D4 |
Pluralsight Tuning and Creating Correlation Searches in Splunk Enterprise Security\05.Importing and Exporting Correlation Searches\05.02.Exporting Correlation Search in Splunk ES.mp4 |
6,506,116 |
FF88B6F7 |
Pluralsight Tuning and Creating Correlation Searches in Splunk Enterprise Security\05.Importing and Exporting Correlation Searches\05.03.Demo Exporting and Importing a Correlation Search.mp4 |
27,856,712 |
2CEC9A50 |
Pluralsight Tuning and Creating Correlation Searches in Splunk Enterprise Security\05.Importing and Exporting Correlation Searches\05.04.Summary.mp4 |
2,877,528 |
D6B7EC74 |
Pluralsight Tuning and Creating Correlation Searches in Splunk Enterprise Security\06.Implementing ES-specific Lookups and Managing Identities\06.01.Overview.mp4 |
5,134,468 |
DDA639E4 |
Pluralsight Tuning and Creating Correlation Searches in Splunk Enterprise Security\06.Implementing ES-specific Lookups and Managing Identities\06.02.Splunk ES-specific Lookups.mp4 |
7,052,068 |
0EB62AD5 |
Pluralsight Tuning and Creating Correlation Searches in Splunk Enterprise Security\06.Implementing ES-specific Lookups and Managing Identities\06.03.Demo Splunk ES-specific Lookups.mp4 |
31,892,884 |
071A09D7 |
Pluralsight Tuning and Creating Correlation Searches in Splunk Enterprise Security\06.Implementing ES-specific Lookups and Managing Identities\06.04.Demo Creating Search-driven Lookups in Splunk Enterprise Security.mp4 |
21,505,884 |
FD0172A6 |
Pluralsight Tuning and Creating Correlation Searches in Splunk Enterprise Security\06.Implementing ES-specific Lookups and Managing Identities\06.05.Introduction to Splunk ES Asset and Identity Framework.mp4 |
10,107,444 |
8BF0CA0A |
Pluralsight Tuning and Creating Correlation Searches in Splunk Enterprise Security\06.Implementing ES-specific Lookups and Managing Identities\06.06.Demo Adding Static Lookups to Asset and Identity Framework.mp4 |
40,398,944 |
10121683 |
Pluralsight Tuning and Creating Correlation Searches in Splunk Enterprise Security\06.Implementing ES-specific Lookups and Managing Identities\06.07.Demo Adding Dynamic Lookups to Asset and Identity Framework.mp4 |
43,233,608 |
ACF862F7 |
Pluralsight Tuning and Creating Correlation Searches in Splunk Enterprise Security\06.Implementing ES-specific Lookups and Managing Identities\06.08.Demo Asset and Identity Investigator Dashboards.mp4 |
16,671,276 |
2C70E033 |
Pluralsight Tuning and Creating Correlation Searches in Splunk Enterprise Security\06.Implementing ES-specific Lookups and Managing Identities\06.09.Summary.mp4 |
3,089,028 |
40DF6DA5 |
Pluralsight Tuning and Creating Correlation Searches in Splunk Enterprise Security\07.Summary\07.01.Wrap-up Summary.mp4 |
4,349,380 |
42993133 |
Pluralsight Tuning and Creating Correlation Searches in Splunk Enterprise Security\Exercise_file.zip |
7,388,351 |
3511C1EB |
Pluralsight Tuning and Creating Correlation Searches in Splunk Enterprise Security\01.Course Overview |
0 |
00000000 |
Pluralsight Tuning and Creating Correlation Searches in Splunk Enterprise Security\02.The Anatomy and Functions of Correlation Searches |
0 |
00000000 |
Pluralsight Tuning and Creating Correlation Searches in Splunk Enterprise Security\03.Tuning Correlation Searches |
0 |
00000000 |
Pluralsight Tuning and Creating Correlation Searches in Splunk Enterprise Security\04.Creating Correlation Searches |
0 |
00000000 |
Pluralsight Tuning and Creating Correlation Searches in Splunk Enterprise Security\05.Importing and Exporting Correlation Searches |
0 |
00000000 |
Pluralsight Tuning and Creating Correlation Searches in Splunk Enterprise Security\06.Implementing ES-specific Lookups and Managing Identities |
0 |
00000000 |
Pluralsight Tuning and Creating Correlation Searches in Splunk Enterprise Security\07.Summary |
0 |
00000000 |
Pluralsight Tuning and Creating Correlation Searches in Splunk Enterprise Security |
0 |
00000000 |
|
Total size: |
491,558,851 |
|
|