Pluralsight - Active Defense with PowerShell 2023-2

File Information:
  1. Magnet Link:Magnet LinkMagnet Link
  2. File Size:189.68 MB
  3. Creat Time:2025-03-25
  4. Active Degree:6
  5. Last Active:2025-05-15
  6. File Tags:Pluralsight  Active  Defense  with  PowerShell  2023  2  
  7. Statement:This site does not provide download links, only text displays, and does not contain any infringement.
File List:

    Pluralsight - Active Defense with PowerShell 2023-2

  1. powershell-active-defense.zip 27.75 MB
  2. 4. Enforcing Secure Configurations/2. Get-CimInstance.mp4 22.74 MB
  3. 4. Enforcing Secure Configurations/6. Windows Defender.mp4 16.85 MB
  4. 4. Enforcing Secure Configurations/3. Invoke-CimMethod.mp4 16.41 MB
  5. 3. Setting the Trap/4. Monitor for Bad Credentials.mp4 14.33 MB
  6. 3. Setting the Trap/2. Honeypot - Create a Honeyport.mp4 12.57 MB
  7. 4. Enforcing Secure Configurations/4. Get-ItemProperty.mp4 11.08 MB
  8. 3. Setting the Trap/5. Maintain the Look of an Active User.mp4 9.81 MB
  9. 4. Enforcing Secure Configurations/1. Execution Policy.mp4 8.72 MB
  10. 2. Active Defense Principles/4. Tools for the Course.mp4 8.58 MB
  11. 3. Setting the Trap/3. Honeypot - Create a Honeytoken.mp4 6.81 MB
  12. 4. Enforcing Secure Configurations/5. Get-WindowsFeature.mp4 6.48 MB
  13. 2. Active Defense Principles/2. What Does Active Defense Mean.mp4 5.86 MB
  14. 1. Course Overview/1. Course Overview.mp4 4.34 MB
  15. 3. Setting the Trap/6. Review Attack Patterns.mp4 4.30 MB
  16. 2. Active Defense Principles/3. Why the Use of PowerShell for Active Defense.mp4 4.10 MB
  17. 4. Enforcing Secure Configurations/7. Summary.mp4 3.14 MB
  18. 2. Active Defense Principles/1. Overview.mp4 2.87 MB
  19. 3. Setting the Trap/1. What Kind of Traps Can Be Set.mp4 2.84 MB
  20. 4. Enforcing Secure Configurations/6. Windows Defender.vtt 9 KB
  21. 4. Enforcing Secure Configurations/2. Get-CimInstance.vtt 9 KB
  22. 3. Setting the Trap/2. Honeypot - Create a Honeyport.vtt 6 KB
  23. 4. Enforcing Secure Configurations/3. Invoke-CimMethod.vtt 6 KB
  24. 3. Setting the Trap/5. Maintain the Look of an Active User.vtt 6 KB
  25. 2. Active Defense Principles/4. Tools for the Course.vtt 6 KB
  26. 4. Enforcing Secure Configurations/4. Get-ItemProperty.vtt 5 KB
  27. 3. Setting the Trap/4. Monitor for Bad Credentials.vtt 5 KB
  28. 4. Enforcing Secure Configurations/1. Execution Policy.vtt 5 KB
  29. 4. Enforcing Secure Configurations/5. Get-WindowsFeature.vtt 4 KB
  30. 3. Setting the Trap/3. Honeypot - Create a Honeytoken.vtt 4 KB
  31. 2. Active Defense Principles/2. What Does Active Defense Mean.vtt 4 KB
  32. 2. Active Defense Principles/3. Why the Use of PowerShell for Active Defense.vtt 3 KB
  33. 4. Enforcing Secure Configurations/7. Summary.vtt 3 KB
  34. 3. Setting the Trap/1. What Kind of Traps Can Be Set.vtt 2 KB
  35. 3. Setting the Trap/6. Review Attack Patterns.vtt 2 KB
  36. 1. Course Overview/1. Course Overview.vtt 2 KB
  37. 2. Active Defense Principles/1. Overview.vtt 2 KB
  38. Read me.txt 0 KB
Hot Tags: