| Parent directory/ | - | - |
| 1.13_In Detail ELK Stack.mp4 | 67.9 MiB | 2023-Jan-23 19:07 |
| 1.7_Security Monitoring part 3.mp4 | 83.5 MiB | 2023-Jan-23 19:10 |
| 1.3_Introduction to SOC.mp4 | 86.5 MiB | 2023-Jan-23 19:01 |
| 1.16_Lab_Threat hunting walk-through.mp4 | 98.5 MiB | 2023-Jan-23 19:08 |
| 1.15_SOC Development And Maturity Levels.mp4 | 106.3 MiB | 2023-Jan-23 19:08 |
| 1.4_SOC People.mp4 | 108.4 MiB | 2023-Jan-23 19:01 |
| 1.8_SOC Use Cases.mp4 | 109.0 MiB | 2023-Jan-23 19:03 |
| 1.6_Security Monitoring part 1.mp4 | 109.0 MiB | 2023-Jan-23 19:00 |
| 1.6a_Security Monitoring part 2.mp4 | 109.7 MiB | 2023-Jan-23 19:02 |
| 1.12a_SOC Technologies Part 2.mp4 | 116.2 MiB | 2023-Jan-23 19:06 |
| 1.17_Lab_WMI Consumer Hunting.mp4 | 118.2 MiB | 2023-Jan-23 19:09 |
| 1.18_Lab_Linux Service Hunting.mp4 | 118.8 MiB | 2023-Jan-23 19:09 |
| 1.19_Lab_Domain Name Hunting.mp4 | 122.4 MiB | 2023-Jan-23 19:10 |
| 1.9_Threat intelligence part 1.mp4 | 157.2 MiB | 2023-Jan-23 19:04 |
| 1.12_SOC Technologies Part 1.mp4 | 164.0 MiB | 2023-Jan-23 19:05 |
| 1.11_Threat Hunting Part 2.mp4 | 175.5 MiB | 2023-Jan-23 19:05 |
| 1.14_SOC Tools.mp4 | 194.4 MiB | 2023-Jan-23 19:07 |
| 1.2_General Cybersecurity Concepts.mp4 | 196.6 MiB | 2023-Jan-23 19:00 |
| 1.9a_Threat Intelligence pt2.mp4 | 200.7 MiB | 2023-Jan-23 19:04 |
| 1.5_Introduction to SOC Services.mp4 | 219.2 MiB | 2023-Jan-23 19:02 |
| 1.10_Threat Hunting Part 1.mp4 | 233.9 MiB | 2023-Jan-23 19:45 |