Microsoft Cybersecurity Pro Track PowerShell Security
File List
- Course/3. PowerShell Operational Security/2. Managing Remote Execution Capabilities of Windows PowerShell.mp4 183.8 MB
- Course/4. Implementing PowerShell-based Security/1. Windows Powershell DSC.mp4 139.9 MB
- Course/5. Windows PowerShell-based Exploits and their Mitigation/1. Windows PowerShell-based Attacks.mp4 127.9 MB
- Course/4. Implementing PowerShell-based Security/2. Just Enough Administration (JEA).mp4 117.7 MB
- Course/3. PowerShell Operational Security/1. Managing Local Script Execution Policy with Windows PowerShell Execution.mp4 111.4 MB
- Course/1. Introduction/3. Preparing the Lab Environment.mp4 90.8 MB
- Course/2. Windows PowerShell Fundamentals/2. PowerShell Editions and Versions.mp4 84.1 MB
- Course/4. Implementing PowerShell-based Security/3. Windows PowerShell Auditing and Logging.mp4 82.9 MB
- Course/3. PowerShell Operational Security/4. Language Mode.mp4 75.8 MB
- Course/2. Windows PowerShell Fundamentals/1. Windows PowerShell Architecture.mp4 63.5 MB
- Course/5. Windows PowerShell-based Exploits and their Mitigation/3. Summary of Windows PowerShell-based Security-Related Technologies.mp4 52.9 MB
- Course/2. Windows PowerShell Fundamentals/3. Running Windows Powershell.mp4 51.0 MB
- Course/5. Windows PowerShell-based Exploits and their Mitigation/2. Windows PowerShell-based Security Tools.mp4 48.3 MB
- Course/3. PowerShell Operational Security/5. Anti-Malware SCan Interface (AMSI).mp4 37.3 MB
- Course/1. Introduction/2. About the Course.mp4 24.0 MB
- Course/3. PowerShell Operational Security/3. Constrained Endpoints.mp4 23.1 MB
- Course/1. Introduction/1. Instructor Introduction.mp4 10.4 MB
- Course/3. PowerShell Operational Security/2. Managing Remote Execution Capabilities of Windows PowerShell.srt 42.0 KB
- Course/4. Implementing PowerShell-based Security/1. Windows Powershell DSC.srt 36.6 KB
- Course/4. Implementing PowerShell-based Security/2. Just Enough Administration (JEA).srt 34.3 KB
- Course/5. Windows PowerShell-based Exploits and their Mitigation/1. Windows PowerShell-based Attacks.srt 33.9 KB
- Course/3. PowerShell Operational Security/1. Managing Local Script Execution Policy with Windows PowerShell Execution.srt 29.6 KB
- Course/3. PowerShell Operational Security/4. Language Mode.srt 22.6 KB
- Course/1. Introduction/3. Preparing the Lab Environment.srt 22.5 KB
- Course/2. Windows PowerShell Fundamentals/2. PowerShell Editions and Versions.srt 21.7 KB
- Course/2. Windows PowerShell Fundamentals/1. Windows PowerShell Architecture.srt 17.8 KB
- Course/4. Implementing PowerShell-based Security/3. Windows PowerShell Auditing and Logging.srt 17.3 KB
- Course/2. Windows PowerShell Fundamentals/3. Running Windows Powershell.srt 13.3 KB
- Course/5. Windows PowerShell-based Exploits and their Mitigation/3. Summary of Windows PowerShell-based Security-Related Technologies.srt 12.5 KB
- Course/5. Windows PowerShell-based Exploits and their Mitigation/2. Windows PowerShell-based Security Tools.srt 8.5 KB
- Course/3. PowerShell Operational Security/5. Anti-Malware SCan Interface (AMSI).srt 7.6 KB
- Course/1. Introduction/2. About the Course.srt 7.4 KB
- Course/3. PowerShell Operational Security/3. Constrained Endpoints.srt 6.6 KB
- Course/1. Introduction/1. Instructor Introduction.srt 2.1 KB
- Course/4. Implementing PowerShell-based Security/3.3 Enable-Script-Block-Logging-Powershell.txt 964 bytes
- Course/4. Implementing PowerShell-based Security/3.2 Enable-System-Wide-Transcription-Powershell.txt 964 bytes
- Course/3. PowerShell Operational Security/1.1 S3L1 - Managing Local Script Execution Policy with Windows PowerShell Execution Policy Documentation.txt 810 bytes
- Course/5. Windows PowerShell-based Exploits and their Mitigation/1.1 S5L1 - Windows PowerShell-based Attacks Documentation.txt 752 bytes
- Course/4. Implementing PowerShell-based Security/3.1 Protected-Event-Logging-Powershell.txt 642 bytes
- [TGx]Downloaded from torrentgalaxy.to .txt 642 bytes
- Course/4. Implementing PowerShell-based Security/2.1 S4L2 - Just Enough Administration (JEA) Documentation.txt 592 bytes
- Course/3. PowerShell Operational Security/2.1 S3L2 - Managing Remote Execution Capabilities of Windows PowerShell Documentation.txt 591 bytes
- Course/2. Windows PowerShell Fundamentals/1.1 S2L1 - Windows PowerShell Architecture Documentation.txt 529 bytes
- Course/4. Implementing PowerShell-based Security/1.1 S4L1 - Windows Powershell DSC Documentation.txt 500 bytes
- Course/3. PowerShell Operational Security/4.1 S3L4 - Language Mode Documentation.txt 434 bytes
- Course/2. Windows PowerShell Fundamentals/2.1 S2L2 - PowerShell Editions and Versions Documentation.txt 276 bytes
- Course/1. Introduction/3.1 S1L3 - Preparing the Lab Environment Documentation.txt 275 bytes
- [UdemyLibrary.com] Join for free courses and tutorials.txt 265 bytes
- Course/2. Windows PowerShell Fundamentals/3.1 S2L3 - Running Windows Powershell Documentation.txt 232 bytes
- Course/3. PowerShell Operational Security/3.1 S3L3 - Constrained Endpoints Documentation.txt 179 bytes
- Course/5. Windows PowerShell-based Exploits and their Mitigation/2.1 S5L2 - Windows PowerShell-based Security Tools.txt 173 bytes
- Course/7. Hands-On Lab/1. Hands-On Lab.html 168 bytes
- Course/6. Final Exam/1. Final Exam.html 164 bytes
- Course/3. PowerShell Operational Security/5.1 S3L5 - Anti-Malware SCan Interface (AMSI) Documentation.txt 149 bytes
- Course/4. Implementing PowerShell-based Security/3.4 S4L3 - Windows PowerShell Auditing and Logging Documentation.txt 147 bytes
- Torrent downloaded from Demonoid.is.txt 112 bytes
- Torrent downloaded from ettvcentral.com.txt 110 bytes
- Torrent downloaded from 1337x.to.txt 100 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.