Видео: Windows Server Security, Advanced Windows Auditing, Threat Analysis, and Group Policy IT Training

Use Case : Detecting Brute Force Attacks

This use case video shows how to use Windows security logs to find possible brute force attacks on your network.

Assessment and Remediation using the SCAP Tool

This webinar will assist you in creating Assessment and Authorization Packages using the Security Content Automation Protocol ...

How To: Microsoft Security Risk Detection (Web Vulnerability Scanning)

Microsoft Security Risk Detection - How to use MSRD to perform Web App Scanning See more at ...

The Role of Threat Analytics in Privileged Account Security - Part 1

Attackers are trained to operate on networks undetected… and they are good at it. Successful detection techniques require a ...

SANS DFIR Webcast - Incident Response Event Log Analysis

SANS Incident Response Training Course: http://www.sans.org/course/advanced-computer-forensic-analysis-incident-response ...

Windows Ransomware Detection with Splunk (1 of 6) – Vulnerability Detection and Windows Patch Status

In this 6-part series, Splunk's James Brodsky walks through real-world examples of Windows ransomware detection techniques, ...

Explore Microsoft Windows Server 2016 Security

This foundation session walks you through the current threat environment and the security principles guiding principles that ...

Tutorial: Searching Through Logs: Where Do I Start?

Learn more on the Live Community at http://bit.ly/2E2Id7x. It's important to log traffic flowing through the firewall, but it can become ...

Real life hacks for Windows and Office... and how to stop them (Microsoft Ignite)

Microsoft's Hacker in Chief, Dave Weston, demonstrates real world hacks for Windows and Office along with how to stop them ...

BSides Iowa 2018: "Threat Hunting Windows Event Logs w/ Powershell"

BSides Iowa 2018 - Track 1 Speaker: Justin Williams This talk will cover the basics of using the system events on Windows to ...

Advanced Windows Logging - Finding What AV Missed

01:00 - Explaining the HELK Architecture 02:50 - Showing my VM's Spec's/build 03:50 - Installing HELK 05:40 - Poking around ...

Why You Should Take AUD507: Auditing & Monitoring Networks, Perimeters & Systems

Course author David Hoelzer explains what makes AUD507: Auditing & Monitoring Networks, Perimeters & Systems such a great ...

How To Track Logon Sessions with Windows Security Log

Logon session auditing can be tricky.The Good News: The data is in the security log.The Bad News: The actual events denoting ...

Detecting Lateral Movement with New Events in the Windows Server 2016 Security Log

Preventing attackers from gaining control of network endpoints is difficult. Your preventative controls might stop such an event, but ...

Event Log Monitoring | Centralized Windows Event Log Collector

Remotely monitor windows event logs. Collect all event and error logs from windows computers. Lansweepers centralized windows ...

What Event Logs Part 2 Lateral Movement without Event Logs

Working without Windows Event Logs - a two-part webcast series. Many analysts rely on Windows Event Logs to help gain ...

What Event Logs? Part 1: Attacker Tricks to Remove Event Logs

Many analysts rely on Windows Event Logs to help gain context of attacker activity on a system, with log entries serving as ...

MCITP 70-640: Security Configuration Wizard

Check out http://YouTube.com/ITFreeTraining or http://itfreetraining.com for more of our always free training videos. The Security ...

Azure Full Course - Learn Microsoft Azure in 8 Hours | Azure Tutorial For Beginners | Edureka

Azure Training - https://www.edureka.co/microsoft-certified-azure-solution... This Edureka ...

Опубликовано: 08 Апр 2020

Случайные видео:

© 2020 | Главная | Contact