Lynda - Learning System Center 2016 Endpoint Protection
File List
- 4. 3. Endpoint Protection Policies/19. Configure an Automatic Deployment Rule.mp4 19.3 MB
- 5. 4. Monitoring Endpoint Protection/26. Reports.mp4 14.8 MB
- 5. 4. Monitoring Endpoint Protection/23. Using PowerShell cmdlets for monitoring.mp4 13.5 MB
- 5. 4. Monitoring Endpoint Protection/22. In-console monitoring.mp4 12.4 MB
- 5. 4. Monitoring Endpoint Protection/24. Client logs and WMI queries.mp4 12.0 MB
- 3. 2 Getting Endpoint Protection Up and Running/11. Deploy the SCEP Windows client.mp4 11.9 MB
- 4. 3. Endpoint Protection Policies/15. Custom policies and priority order.mp4 10.5 MB
- 4. 3. Endpoint Protection Policies/16. Policy settings.mp4 10.4 MB
- 5. 4. Monitoring Endpoint Protection/25. Alerts and subscriptions.mp4 10.1 MB
- 4. 3. Endpoint Protection Policies/17. Configure custom policies.mp4 10.0 MB
- 3. 2 Getting Endpoint Protection Up and Running/09. Server requirements.mp4 9.6 MB
- 3. 2 Getting Endpoint Protection Up and Running/10. Supported clients.mp4 9.4 MB
- 4. 3. Endpoint Protection Policies/18. Plan an update strategy.mp4 9.4 MB
- 4. 3. Endpoint Protection Policies/14. Default policy.mp4 8.4 MB
- 2. 1. Defining Malware Types/07. Phishing and ransomware.mp4 8.3 MB
- 3. 2 Getting Endpoint Protection Up and Running/12. Remove malware on a SCEP client.mp4 7.8 MB
- 4. 3. Endpoint Protection Policies/21. Windows Advanced Threat Protection.mp4 7.3 MB
- 2. 1. Defining Malware Types/06. Viruses, trojans, and rootkits.mp4 6.8 MB
- 4. 3. Endpoint Protection Policies/13. Hardening.mp4 6.3 MB
- 2. 1. Defining Malware Types/08. Network vulnerability detection.mp4 6.0 MB
- 1. Introduction/01. Welcome.mp4 5.9 MB
- 4. 3. Endpoint Protection Policies/20. Windows firewall settings.mp4 5.7 MB
- 2. 1. Defining Malware Types/04. Social engineering.mp4 5.3 MB
- 2. 1. Defining Malware Types/05. Spyware and adware.mp4 4.3 MB
- 6. Conclusion/27. Next steps.mp4 3.3 MB
- 1. Introduction/02. What you should know.mp4 1.8 MB
- 1. Introduction/03. How to use the exercise files.mp4 496.5 KB
- 5. 4. Monitoring Endpoint Protection/26. Reports.en.srt 14.3 KB
- 5. 4. Monitoring Endpoint Protection/23. Using PowerShell cmdlets for monitoring.en.srt 12.6 KB
- 4. 3. Endpoint Protection Policies/19. Configure an Automatic Deployment Rule.en.srt 12.2 KB
- 4. 3. Endpoint Protection Policies/15. Custom policies and priority order.en.srt 10.8 KB
- 5. 4. Monitoring Endpoint Protection/22. In-console monitoring.en.srt 10.7 KB
- 2. 1. Defining Malware Types/07. Phishing and ransomware.en.srt 10.4 KB
- 3. 2 Getting Endpoint Protection Up and Running/10. Supported clients.en.srt 10.0 KB
- 4. 3. Endpoint Protection Policies/16. Policy settings.en.srt 9.7 KB
- 3. 2 Getting Endpoint Protection Up and Running/09. Server requirements.en.srt 9.4 KB
- 4. 3. Endpoint Protection Policies/18. Plan an update strategy.en.srt 9.2 KB
- 5. 4. Monitoring Endpoint Protection/24. Client logs and WMI queries.en.srt 8.7 KB
- 5. 4. Monitoring Endpoint Protection/25. Alerts and subscriptions.en.srt 8.6 KB
- 4. 3. Endpoint Protection Policies/14. Default policy.en.srt 8.4 KB
- 4. 3. Endpoint Protection Policies/21. Windows Advanced Threat Protection.en.srt 8.3 KB
- 3. 2 Getting Endpoint Protection Up and Running/11. Deploy the SCEP Windows client.en.srt 8.3 KB
- 4. 3. Endpoint Protection Policies/13. Hardening.en.srt 8.1 KB
- 2. 1. Defining Malware Types/06. Viruses, trojans, and rootkits.en.srt 8.0 KB
- 4. 3. Endpoint Protection Policies/17. Configure custom policies.en.srt 7.2 KB
- 4. 3. Endpoint Protection Policies/20. Windows firewall settings.en.srt 6.8 KB
- 2. 1. Defining Malware Types/08. Network vulnerability detection.en.srt 6.7 KB
- 2. 1. Defining Malware Types/04. Social engineering.en.srt 6.1 KB
- 3. 2 Getting Endpoint Protection Up and Running/12. Remove malware on a SCEP client.en.srt 5.5 KB
- 2. 1. Defining Malware Types/05. Spyware and adware.en.srt 5.4 KB
- 6. Conclusion/27. Next steps.en.srt 2.2 KB
- 1. Introduction/01. Welcome.en.srt 2.2 KB
- 1. Introduction/02. What you should know.en.srt 2.1 KB
- 1. Introduction/03. How to use the exercise files.en.srt 747 bytes
- Exercise Files/04_02/Endpoint_PowerShell_Cmdlets.ps1 323 bytes
- Exercise Files/04_02/Win10_Defender_PowerShell.ps1 148 bytes
- Exercise Files/02_04/ViewDetectedThreats.ps1 116 bytes
- Exercise Files/03_04/ReqQuery_AppliedPolicies.ps1 116 bytes
- Exercise Files/04_03/WMIQuery.ps1 108 bytes
- Exercise Files/04_03/Icon 0 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.