Torrent details for "Udemy Threat Detection in an Enterprise" Log in to bookmark
Controls:
×
Report Torrent
Please select a reason for reporting this torrent:
Your report will be reviewed by our moderation team.
×
Report Information
Loading report information...
This torrent has been reported 0 times.
Report Summary:
| User | Reason | Date |
|---|
Failed to load report information.
×
Success
Your report has been submitted successfully.
Checked by:
Category:
Language:
English
Total Size:
1.5 GB
Info Hash:
3883FB7BBF162CBAB29C2A023321C179CB72BAC9
Added By:
Added:
Oct. 25, 2023, 6:37 a.m.
Stats:
|
(Last updated: May 15, 2025, 10:18 a.m.)
| File | Size |
|---|---|
| Get Bonus Downloads Here.url | 180 bytes |
| 1. Instructor Introduction.mp4 | 10.5 MB |
| 1. Instructor Introduction.srt | 2.1 KB |
| 2. About The Course.mp4 | 36.0 MB |
| 2. About The Course.srt | 10.9 KB |
| 3. Set Up The Lab Environment.mp4 | 92.7 MB |
| 3. Set Up The Lab Environment.srt | 23.4 KB |
| 3.1 S1L3 - Set Up The Lab Environment Documentation.txt | 275 bytes |
| 1. An Overview of the Modern Cyber Threat Landscape.mp4 | 227.9 MB |
| 1. An Overview of the Modern Cyber Threat Landscape.srt | 53.9 KB |
| 1.1 S2L1 - An Overview of the Modern Cyber Threat Landscape Documentation.txt | 377 bytes |
| 2. Integrating Pre-Breach and Post-Breach Approaches to Mitigate Cyber Threats.mp4 | 40.5 MB |
| 2. Integrating Pre-Breach and Post-Breach Approaches to Mitigate Cyber Threats.srt | 12.9 KB |
| 3. Comparing Signature-Based and Behavioral Heuristics Detection Methods.mp4 | 42.7 MB |
| 3. Comparing Signature-Based and Behavioral Heuristics Detection Methods.srt | 9.8 KB |
| 4. Combating Threat Persistence.mp4 | 77.0 MB |
| 4. Combating Threat Persistence.srt | 16.1 KB |
| 5. Section 1 Review Questions.html | 188 bytes |
| 1. Windows Event Forwarding and Intrusion Detection.mp4 | 53.2 MB |
| 1. Windows Event Forwarding and Intrusion Detection.srt | 17.9 KB |
| 1.1 S3L1 - Windows Event Forwarding and Intrusion Detection Documentation.txt | 192 bytes |
| 2. Microsoft Advanced Threat Analytics.mp4 | 62.8 MB |
| 2. Microsoft Advanced Threat Analytics.srt | 22.6 KB |
| 2.1 S3L2 - Microsoft Advanced Threat Analytics Documentation.txt | 125 bytes |
| 3. Microsoft Defender for Endpoint (Microsoft Defender Advanced Threat Protection).mp4 | 55.4 MB |
| 3. Microsoft Defender for Endpoint (Microsoft Defender Advanced Threat Protection).srt | 17.7 KB |
| 3.1 S3L3 - Microsoft Defender Advanced Threat Protection Documentation.txt | 221 bytes |
| 4. Microsoft Enterprise Threat Detection.mp4 | 47.8 MB |
| 4. Microsoft Enterprise Threat Detection.srt | 11.5 KB |
| 5. Microsoft Security Risk Detection.mp4 | 20.4 MB |
| 5. Microsoft Security Risk Detection.srt | 5.6 KB |
| 6. Antimalware Scan Interface (AMSI).mp4 | 12.0 MB |
| 6. Antimalware Scan Interface (AMSI).srt | 3.5 KB |
| 7. Logging and Auditing.mp4 | 45.8 MB |
| 7. Logging and Auditing.srt | 12.2 KB |
| 7.1 S3L7 - Logging and Auditing Documentation.txt | 98 bytes |
| 8. Threat Detection Tools.mp4 | 33.4 MB |
| 8. Threat Detection Tools.srt | 8.9 KB |
| 8.1 S3L8 - Threat Detection Tools Documentation.txt | 155 bytes |
| 9. Section 2 Review Questions.html | 188 bytes |
| 1. Microsoft Cloud App Security and O365 Cloud App Security.mp4 | 64.2 MB |
| 1. Microsoft Cloud App Security and O365 Cloud App Security.srt | 17.4 KB |
| 1.1 S4L1 - Microsoft Cloud App Security and O365 Cloud App Security Documentation.txt | 62 bytes |
| 2. Microsoft Defender for O365 (former Office 365 Advanced Threat Protection).mp4 | 45.9 MB |
| 2. Microsoft Defender for O365 (former Office 365 Advanced Threat Protection).srt | 13.8 KB |
| 3. Office 365 Threat Inteligence.mp4 | 28.4 MB |
| 3. Office 365 Threat Inteligence.srt | 8.2 KB |
| 4. Azure Advanced Threat Detection.mp4 | 124.5 MB |
| 4. Azure Advanced Threat Detection.srt | 35.0 KB |
| 5. Azure Logging and Auditing.mp4 | 24.1 MB |
| 5. Azure Logging and Auditing.srt | 6.5 KB |
| 6. Microsoft Enterprise Mobility + Security (EMS).mp4 | 35.2 MB |
| 6. Microsoft Enterprise Mobility + Security (EMS).srt | 8.5 KB |
| 7. Microsoft 365.mp4 | 13.1 MB |
| 7. Microsoft 365.srt | 6.5 KB |
| 7.1 S4L6 - Microsoft 365 Documentation.txt | 133 bytes |
| 8. Section 3 Review Questions.html | 188 bytes |
| 1. Layered Machine Learning defenses in Windows Defender Antivirus.mp4 | 74.4 MB |
| 1. Layered Machine Learning defenses in Windows Defender Antivirus.srt | 18.7 KB |
| 2. Detecting Persistent Threats using MDE (Microsoft Defender ATP).mp4 | 115.6 MB |
| 2. Detecting Persistent Threats using MDE (Microsoft Defender ATP).srt | 32.1 KB |
| 3. Enterprise Threat Detection behavioral monitoring.mp4 | 37.3 MB |
| 3. Enterprise Threat Detection behavioral monitoring.srt | 9.8 KB |
| 4. Microsoft comprehensive approach to cyber threat detection.mp4 | 72.8 MB |
| 4. Microsoft comprehensive approach to cyber threat detection.srt | 19.3 KB |
| 5. Section 4 Review Questions.html | 188 bytes |
| 1. Hands-On Lab.html | 192 bytes |
| 1. Final Exam.html | 188 bytes |
| Bonus Resources.txt | 357 bytes |
Name
DL
Uploader
Size
S/L
Added
-
568.5 MB
[1
/
11]
2025-08-14
| Uploaded by freecoursewb | Size 568.5 MB | Health [ 1 /11 ] | Added 2025-08-14 |
-
634.8 MB
[48
/
50]
2024-10-24
| Uploaded by FreeCourseWeb | Size 634.8 MB | Health [ 48 /50 ] | Added 2024-10-24 |
-
989.9 MB
[0
/
2]
2023-06-01
| Uploaded by freecoursewb | Size 989.9 MB | Health [ 0 /2 ] | Added 2023-06-01 |
-
870.9 MB
[4
/
17]
2025-05-08
| Uploaded by freecoursewb | Size 870.9 MB | Health [ 4 /17 ] | Added 2025-05-08 |
-
266.2 MB
[11
/
1]
2026-03-02
| Uploaded by freecoursewb | Size 266.2 MB | Health [ 11 /1 ] | Added 2026-03-02 |
NOTE
SOURCE: Udemy Threat Detection in an Enterprise
-----------------------------------------------------------------------------------
COVER

-----------------------------------------------------------------------------------
MEDIAINFO
None
×



