Pluralsight - Active Defense with PowerShell 2023-2
File Information:
- Magnet Link:
Magnet Link
- File Size:189.68 MB
- Creat Time:2025-03-25
- Active Degree:6
- Last Active:2025-05-15
- File Tags:Pluralsight Active Defense with PowerShell 2023 2
- Statement:This site does not provide download links, only text displays, and does not contain any infringement.
File List:
- powershell-active-defense.zip 27.75 MB
- 4. Enforcing Secure Configurations/2. Get-CimInstance.mp4 22.74 MB
- 4. Enforcing Secure Configurations/6. Windows Defender.mp4 16.85 MB
- 4. Enforcing Secure Configurations/3. Invoke-CimMethod.mp4 16.41 MB
- 3. Setting the Trap/4. Monitor for Bad Credentials.mp4 14.33 MB
- 3. Setting the Trap/2. Honeypot - Create a Honeyport.mp4 12.57 MB
- 4. Enforcing Secure Configurations/4. Get-ItemProperty.mp4 11.08 MB
- 3. Setting the Trap/5. Maintain the Look of an Active User.mp4 9.81 MB
- 4. Enforcing Secure Configurations/1. Execution Policy.mp4 8.72 MB
- 2. Active Defense Principles/4. Tools for the Course.mp4 8.58 MB
- 3. Setting the Trap/3. Honeypot - Create a Honeytoken.mp4 6.81 MB
- 4. Enforcing Secure Configurations/5. Get-WindowsFeature.mp4 6.48 MB
- 2. Active Defense Principles/2. What Does Active Defense Mean.mp4 5.86 MB
- 1. Course Overview/1. Course Overview.mp4 4.34 MB
- 3. Setting the Trap/6. Review Attack Patterns.mp4 4.30 MB
- 2. Active Defense Principles/3. Why the Use of PowerShell for Active Defense.mp4 4.10 MB
- 4. Enforcing Secure Configurations/7. Summary.mp4 3.14 MB
- 2. Active Defense Principles/1. Overview.mp4 2.87 MB
- 3. Setting the Trap/1. What Kind of Traps Can Be Set.mp4 2.84 MB
- 4. Enforcing Secure Configurations/6. Windows Defender.vtt 9 KB
- 4. Enforcing Secure Configurations/2. Get-CimInstance.vtt 9 KB
- 3. Setting the Trap/2. Honeypot - Create a Honeyport.vtt 6 KB
- 4. Enforcing Secure Configurations/3. Invoke-CimMethod.vtt 6 KB
- 3. Setting the Trap/5. Maintain the Look of an Active User.vtt 6 KB
- 2. Active Defense Principles/4. Tools for the Course.vtt 6 KB
- 4. Enforcing Secure Configurations/4. Get-ItemProperty.vtt 5 KB
- 3. Setting the Trap/4. Monitor for Bad Credentials.vtt 5 KB
- 4. Enforcing Secure Configurations/1. Execution Policy.vtt 5 KB
- 4. Enforcing Secure Configurations/5. Get-WindowsFeature.vtt 4 KB
- 3. Setting the Trap/3. Honeypot - Create a Honeytoken.vtt 4 KB
- 2. Active Defense Principles/2. What Does Active Defense Mean.vtt 4 KB
- 2. Active Defense Principles/3. Why the Use of PowerShell for Active Defense.vtt 3 KB
- 4. Enforcing Secure Configurations/7. Summary.vtt 3 KB
- 3. Setting the Trap/1. What Kind of Traps Can Be Set.vtt 2 KB
- 3. Setting the Trap/6. Review Attack Patterns.vtt 2 KB
- 1. Course Overview/1. Course Overview.vtt 2 KB
- 2. Active Defense Principles/1. Overview.vtt 2 KB
- Read me.txt 0 KB
Pluralsight - Active Defense with PowerShell 2023-2
Hot Tags: