RAR-files |
noledge-implementing-and-managing-office-365-advanced-threat-protection.rar |
15,000,000 |
6B6236B0 |
noledge-implementing-and-managing-office-365-advanced-threat-protection.r00 |
15,000,000 |
DF9C6E07 |
noledge-implementing-and-managing-office-365-advanced-threat-protection.r01 |
15,000,000 |
84EFFE85 |
noledge-implementing-and-managing-office-365-advanced-threat-protection.r02 |
15,000,000 |
9A95584B |
noledge-implementing-and-managing-office-365-advanced-threat-protection.r03 |
15,000,000 |
0BB09FD7 |
noledge-implementing-and-managing-office-365-advanced-threat-protection.r04 |
15,000,000 |
6B686F3D |
noledge-implementing-and-managing-office-365-advanced-threat-protection.r05 |
15,000,000 |
C7C99409 |
noledge-implementing-and-managing-office-365-advanced-threat-protection.r06 |
15,000,000 |
19A9C1EE |
noledge-implementing-and-managing-office-365-advanced-threat-protection.r07 |
15,000,000 |
3EC46E39 |
noledge-implementing-and-managing-office-365-advanced-threat-protection.r08 |
15,000,000 |
1D38DCD4 |
noledge-implementing-and-managing-office-365-advanced-threat-protection.r09 |
15,000,000 |
CB44A20C |
noledge-implementing-and-managing-office-365-advanced-threat-protection.r10 |
13,575,689 |
26BA9AE5 |
|
Total size: |
178,575,689 |
|
|
Archived
files |
Implementing-and-Managing-Office-365-Advanced-Threat-Protection\02_Introduction_to_office_365_advanced_threat_protection\07_Summary.mp4
[3b27abdc450f95e5]
|
3,158,099 |
ABC4E208 |
Implementing-and-Managing-Office-365-Advanced-Threat-Protection\02_Introduction_to_office_365_advanced_threat_protection\03_Common_Threats.mp4
[26de616f140e3517]
|
1,983,953 |
610617D2 |
Implementing-and-Managing-Office-365-Advanced-Threat-Protection\02_Introduction_to_office_365_advanced_threat_protection\04_Protecting_Office_365.mp4
[35f99798910804e3]
|
5,054,732 |
79E4D149 |
Implementing-and-Managing-Office-365-Advanced-Threat-Protection\02_Introduction_to_office_365_advanced_threat_protection\06_Demo_Verifying_Office_365_ATP_Availability.mp4
[afdc0e35b0dce0d0]
|
13,416,995 |
6CB0831F |
Implementing-and-Managing-Office-365-Advanced-Threat-Protection\02_Introduction_to_office_365_advanced_threat_protection\05_Microsoft_Office_365_Advanced_Threat_Protection_ATP.mp4
[4937fd0c977dcc2f]
|
8,178,226 |
3CCD8EAD |
Implementing-and-Managing-Office-365-Advanced-Threat-Protection\02_Introduction_to_office_365_advanced_threat_protection\02_Introduction.mp4
[8da45f24e99d54d2]
|
5,445,507 |
80782494 |
Implementing-and-Managing-Office-365-Advanced-Threat-Protection\01_Course_Overview\01_Course_Overview.mp4
[d156110f0aaefeac]
|
3,781,219 |
A05C9AF9 |
Implementing-and-Managing-Office-365-Advanced-Threat-Protection\exercise_file.zip |
670,071 |
CE692908 |
Implementing-and-Managing-Office-365-Advanced-Threat-Protection\04_Spam_and_Phishing_Protections_in_Office_365_ATP\13_Introduction.mp4
[ab84df9d87f2ce63]
|
2,860,385 |
36BDD1C2 |
Implementing-and-Managing-Office-365-Advanced-Threat-Protection\04_Spam_and_Phishing_Protections_in_Office_365_ATP\16_Demo_Implementing_Anti_phishing.mp4
[733b57eadc10d02a]
|
14,193,862 |
A19F5BE3 |
Implementing-and-Managing-Office-365-Advanced-Threat-Protection\04_Spam_and_Phishing_Protections_in_Office_365_ATP\15_Demo_Working_with_Anti_spam_and_Spoofing.mp4
[db6ce78ef6f758a5]
|
20,421,358 |
9FD62050 |
Implementing-and-Managing-Office-365-Advanced-Threat-Protection\04_Spam_and_Phishing_Protections_in_Office_365_ATP\17_Summary.mp4
[13d74af405d25443]
|
2,103,349 |
28EE7D58 |
Implementing-and-Managing-Office-365-Advanced-Threat-Protection\04_Spam_and_Phishing_Protections_in_Office_365_ATP\14_Office_365_Anti_spam_Protection.mp4
[fb6e42328dc29d88]
|
9,199,588 |
382E35E0 |
Implementing-and-Managing-Office-365-Advanced-Threat-Protection\03_Implementing_Threat_Protection_with_Safe_Links_and_Safe_Attachments\10_Demo_Working_with_ATP_Safe_Attachments.mp4
[c663cc38e847c84f]
|
16,118,912 |
D7960CBD |
Implementing-and-Managing-Office-365-Advanced-Threat-Protection\03_Implementing_Threat_Protection_with_Safe_Links_and_Safe_Attachments\11_Demo_Configuring_ATP_Safe_Links.mp4
[73648d8d632aee0d]
|
15,638,568 |
30D7BE26 |
Implementing-and-Managing-Office-365-Advanced-Threat-Protection\03_Implementing_Threat_Protection_with_Safe_Links_and_Safe_Attachments\08_Introduction.mp4
[5992f2ea0eb05f49]
|
1,551,705 |
2977D481 |
Implementing-and-Managing-Office-365-Advanced-Threat-Protection\03_Implementing_Threat_Protection_with_Safe_Links_and_Safe_Attachments\09_ATP_Safe_Attachments_and_Safe_Links.mp4
[e280826b4190c8ee]
|
3,858,285 |
BD59AD13 |
Implementing-and-Managing-Office-365-Advanced-Threat-Protection\03_Implementing_Threat_Protection_with_Safe_Links_and_Safe_Attachments\12_Summary.mp4
[a1c12e414352f4dc]
|
1,901,780 |
656C07B8 |
Implementing-and-Managing-Office-365-Advanced-Threat-Protection\05_Threat_Reporting_and_Responding_with_Office_365_ATP\18_Introduction.mp4
[35037cbd95bc69b0]
|
2,198,911 |
BB87E577 |
Implementing-and-Managing-Office-365-Advanced-Threat-Protection\05_Threat_Reporting_and_Responding_with_Office_365_ATP\25_Summary.mp4
[413899ca2ade5c11]
|
3,025,542 |
90CC434F |
Implementing-and-Managing-Office-365-Advanced-Threat-Protection\05_Threat_Reporting_and_Responding_with_Office_365_ATP\21_Demo_Reviewing_Quarantine_Items.mp4
[3a8d11873fcdc5ac]
|
10,281,887 |
246C3403 |
Implementing-and-Managing-Office-365-Advanced-Threat-Protection\05_Threat_Reporting_and_Responding_with_Office_365_ATP\23_Demo_Investigation_and_Remediation_of_Incidents.mp4
[5b5779aced6d7326]
|
11,630,668 |
8671B47F |
Implementing-and-Managing-Office-365-Advanced-Threat-Protection\05_Threat_Reporting_and_Responding_with_Office_365_ATP\19_Office_365_ATP_Threat_Investigation.mp4
[a85eccfb54ce06c7]
|
5,874,795 |
B590DC48 |
Implementing-and-Managing-Office-365-Advanced-Threat-Protection\05_Threat_Reporting_and_Responding_with_Office_365_ATP\24_Attack_Simulator.mp4
[de4ed52e9d8e4db9]
|
2,227,365 |
6482F99A |
Implementing-and-Managing-Office-365-Advanced-Threat-Protection\05_Threat_Reporting_and_Responding_with_Office_365_ATP\20_Demo_Investigate_Suspicious_Email_with_Threat_Tracker_and_Threat_Explorer.mp4
[3f19066f943395dd]
|
10,346,745 |
3B7E2A64 |
Implementing-and-Managing-Office-365-Advanced-Threat-Protection\05_Threat_Reporting_and_Responding_with_Office_365_ATP\22_Automated_Investigation_and_Response.mp4
[52de10186838a2d9]
|
3,444,689 |
28A94915 |
Implementing-and-Managing-Office-365-Advanced-Threat-Protection\02_Introduction_to_office_365_advanced_threat_protection |
0 |
00000000 |
Implementing-and-Managing-Office-365-Advanced-Threat-Protection\01_Course_Overview |
0 |
00000000 |
Implementing-and-Managing-Office-365-Advanced-Threat-Protection\04_Spam_and_Phishing_Protections_in_Office_365_ATP |
0 |
00000000 |
Implementing-and-Managing-Office-365-Advanced-Threat-Protection\03_Implementing_Threat_Protection_with_Safe_Links_and_Safe_Attachments |
0 |
00000000 |
Implementing-and-Managing-Office-365-Advanced-Threat-Protection\05_Threat_Reporting_and_Responding_with_Office_365_ATP |
0 |
00000000 |
Implementing-and-Managing-Office-365-Advanced-Threat-Protection |
0 |
00000000 |
|
Total size: |
178,567,196 |
|
|