File | Size |
---|
Get Bonus Downloads Here.url | 182.00 B |
~Get Your Files Here !/1. SECTION 1/1. Introduction.mp4 | 58.63 MB |
~Get Your Files Here !/1. SECTION 1/10. Misconfiguration #6.mp4 | 36.14 MB |
~Get Your Files Here !/1. SECTION 1/11. Misconfiguration #7.mp4 | 46.79 MB |
~Get Your Files Here !/1. SECTION 1/12. Misconfiguration #8.mp4 | 67.77 MB |
~Get Your Files Here !/1. SECTION 1/13. Misconfiguration #9.mp4 | 31.75 MB |
~Get Your Files Here !/1. SECTION 1/14. Misconfiguration #10.mp4 | 47.45 MB |
~Get Your Files Here !/1. SECTION 1/15. End of Section 1 Quiz.mp4 | 24.97 MB |
~Get Your Files Here !/1. SECTION 1/2. Course Agenda.mp4.mp4 | 43.46 MB |
~Get Your Files Here !/1. SECTION 1/3. Intro to Systemic weaknesses in relation to cybersecurity misconfigurations.mp4 | 82.95 MB |
~Get Your Files Here !/1. SECTION 1/4. Intro to the top 10 NSA & CISA Misconfigurations.mp4 | 21.43 MB |
~Get Your Files Here !/1. SECTION 1/5. Misconfiguration #1.mp4 | 100.30 MB |
~Get Your Files Here !/1. SECTION 1/6. Misconfiguration #2.mp4 | 94.88 MB |
~Get Your Files Here !/1. SECTION 1/7. Misconfiguration #3.mp4 | 78.44 MB |
~Get Your Files Here !/1. SECTION 1/8. Misconfiguration #4.mp4 | 47.56 MB |
~Get Your Files Here !/1. SECTION 1/9. Misconfiguration #5.mp4 | 58.22 MB |
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/1. An Intro to MITRE ATT&CK Framework.mp4 | 36.17 MB |
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/10. Mitigate-Poor credential hygiene.mp4 | 65.58 MB |
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/11. Mitigate- Unrestricted code execution.mp4 | 67.70 MB |
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/12. Validating Security Controls.mp4 | 54.82 MB |
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/13. Open-Source Tools for Testing Active Directory Misconfigurations.mp4 | 65.71 MB |
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/14. Intro to Open-Source Tools for addressing the top 10 misconfigurations.mp4 | 13.68 MB |
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/15. Open-Source Tools for Preventing Insufficient Access Control Lists (ACLs) on Net.mp4 | 63.06 MB |
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/16. Open-Source Tools for Preventing Lack of Network Segmentation.mp4 | 51.40 MB |
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/17. Open-Source Tools for Preventing Insufficient Internal Network Monitoring.mp4 | 51.20 MB |
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/18. Establishing security baselines to help with mitigating misconfigurations.mp4 | 37.42 MB |
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/19. Lab#1- Creating Security Baselines In Azure.mp4 | 56.26 MB |
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/2. Mitigate-Default configurations of software and applications.mp4 | 79.18 MB |
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/20. Lab#2- PenTest Azure Deployments Misconfigurations using ChatGPT.mp4 | 99.83 MB |
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/21. Lab#3- PenTest Azure Deployments Misconfigurations using ChatGPT.mp4 | 59.89 MB |
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/22. Lab#4-Misconfigurations Research Defense Challenge.mp4 | 32.10 MB |
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/3. Mitigate-Improper separation of useradministrator privilege.mp4 | 75.94 MB |
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/4. Mitigate-Insufficient internal network monitoring.mp4 | 79.04 MB |
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/5. Mitigate-Lack of network segmentation.mp4 | 54.81 MB |
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/6. Mitigate-Poor patch management.mp4 | 33.12 MB |
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/7. Mitigate-Bypass of system access controls.mp4 | 59.21 MB |
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/8. Mitigate-Weak or misconfigured multifactor authentication (MFA) methods.mp4 | 51.75 MB |
~Get Your Files Here !/2. SECTION 2-Misconfigurations Mitigation Recommendations/9. Mitigate-Insufficient access control lists (ACLs) on network shares and services.mp4 | 68.00 MB |
~Get Your Files Here !/3. SECTION 3-Putting everything into perspective/1. Introduction to Section 3.mp4 | 16.87 MB |
~Get Your Files Here !/3. SECTION 3-Putting everything into perspective/10. Case Scenario- Applying Misconfigurations Checklist to a Data Breach Incident.mp4 | 115.04 MB |
~Get Your Files Here !/3. SECTION 3-Putting everything into perspective/11. Improving Hardening of environment against these misconfigurations.mp4 | 128.90 MB |
~Get Your Files Here !/3. SECTION 3-Putting everything into perspective/12. Prevent cloud security misconfigurations via Azure Red Team Pen Testing.mp4 | 65.52 MB |
~Get Your Files Here !/3. SECTION 3-Putting everything into perspective/13. End of Course.mp4 | 13.66 MB |
~Get Your Files Here !/3. SECTION 3-Putting everything into perspective/2. Intro to Root Cause Analysis (RCA).mp4 | 23.03 MB |
~Get Your Files Here !/3. SECTION 3-Putting everything into perspective/3. Benefits of RCA for both Red and Blue Teamers.mp4 | 36.70 MB |
~Get Your Files Here !/3. SECTION 3-Putting everything into perspective/4. Steps for conducting RCA.mp4 | 78.47 MB |
~Get Your Files Here !/3. SECTION 3-Putting everything into perspective/5. Quiz#2.mp4 | 9.64 MB |
~Get Your Files Here !/3. SECTION 3-Putting everything into perspective/6. Intro to creating misconfigurations mitigation checklists using AI.mp4 | 16.76 MB |
~Get Your Files Here !/3. SECTION 3-Putting everything into perspective/7. Creating a misconfiguration prevention checklist.mp4 | 58.88 MB |
~Get Your Files Here !/3. SECTION 3-Putting everything into perspective/8. Creating a misconfiguration checklist that prevents bypass of system access cont.mp4 | 33.72 MB |
~Get Your Files Here !/3. SECTION 3-Putting everything into perspective/9. Challenge-Create Your own misconfigurations checklist.mp4 | 8.82 MB |
~Get Your Files Here !/4. Course Resources/1. Bonus Lecture.html | 2.20 kB |
~Get Your Files Here !/4. Course Resources/1.1 Case Scenario-The Breach of Acme Inc.pdf | 197.73 kB |
~Get Your Files Here !/4. Course Resources/1.2 JOINT_CSA_TOP_TEN_MISCONFIGURATIONS_TLP-CLEAR.PDF | 1.11 MB |
~Get Your Files Here !/4. Course Resources/1.3 Links to websites.txt | 959.00 B |
~Get Your Files Here !/4. Course Resources/1.4 Steps Involved in Root Cause Analysis.pdf | 203.89 kB |
~Get Your Files Here !/Bonus Resources.txt | 386.00 B |