Index of /downloads/Udemy - Applied Ethical Hacking and Rules of Engagement/16 Introduction to Defensive Security

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[VID]001 SIEM vs. SOC.mp42023-10-29 22:34 53M 
[VID]002 How SIEM works.mp42023-10-29 22:03 19M 
[VID]003 What are SIEM Use-Cases and Common Mistakes.mp42023-10-29 22:22 50M 
[VID]004 Threat Intelligence & OSSIM Open Threat Exchange (OTX) P1.mp42023-10-29 22:09 54M 
[VID]005 Threat Intelligence & OSSIM Open Threat Exchange (OTX) P2.mp42023-10-29 22:13 39M 
[VID]006 SIEM vs. SOAR vs. UEBA.mp42023-10-29 22:08 23M 
[VID]007 How secure is secure enough.mp42023-10-29 22:23 28M 
[VID]008 Defense-in-Depth Architecture Part 1.mp42023-10-29 22:04 47M 
[VID]009 Defense-in-Depth Architecture Part 2.mp42023-10-29 22:16 39M 

Apache/2.4.66 (Debian) Server at storage.dankodavid.hu Port 80