Filename | Size |
| 0 - Introduction/01. Staying_safe_with_Advanced_Threat_Protection_ATP.en.srt | 1.3 KB |
| 0 - Introduction/01. Staying_safe_with_Advanced_Threat_Protection_ATP.mp4 | 3.3 MB |
| 0 - Introduction/02. What_you_should_know.en.srt | 1.2 KB |
| 0 - Introduction/02. What_you_should_know.mp4 | 1.4 MB |
| 1 - 1._Implementing_Office_365_ATP/03. Protect_against_threats_in_Office_365.en.srt | 5 KB |
| 1 - 1._Implementing_Office_365_ATP/03. Protect_against_threats_in_Office_365.mp4 | 7.1 MB |
| 1 - 1._Implementing_Office_365_ATP/04. Common_Office_365_threats.en.srt | 9 KB |
| 1 - 1._Implementing_Office_365_ATP/04. Common_Office_365_threats.mp4 | 13 MB |
| 1 - 1._Implementing_Office_365_ATP/05. Office_365_data_protection_measures.en.srt | 7.9 KB |
| 1 - 1._Implementing_Office_365_ATP/05. Office_365_data_protection_measures.mp4 | 11 MB |
| 1 - 1._Implementing_Office_365_ATP/06. Demo_-_Office_365_Security_Compliance_Center.en.srt | 3.5 KB |
| 1 - 1._Implementing_Office_365_ATP/06. Demo_-_Office_365_Security_Compliance_Center.mp4 | 5.9 MB |
| 1 - 1._Implementing_Office_365_ATP/07. Office_365_Advanced_Threat_Protection.en.srt | 11.8 KB |
| 1 - 1._Implementing_Office_365_ATP/07. Office_365_Advanced_Threat_Protection.mp4 | 17.8 MB |
| 1 - 1._Implementing_Office_365_ATP/08. Demo_-_Threat_management_console.en.srt | 5.5 KB |
| 1 - 1._Implementing_Office_365_ATP/08. Demo_-_Threat_management_console.mp4 | 10 MB |
| 1 - 1._Implementing_Office_365_ATP/09. Understanding_security_admin_roles.en.srt | 4.7 KB |
| 1 - 1._Implementing_Office_365_ATP/09. Understanding_security_admin_roles.mp4 | 7.4 MB |
| 1 - 1._Implementing_Office_365_ATP/10. Demo_-_Configure_security_roles.en.srt | 1.9 KB |
| 1 - 1._Implementing_Office_365_ATP/10. Demo_-_Configure_security_roles.mp4 | 3.9 MB |
| 2 - 2._ATP_Anti-Phishing_Policies/11. ATP_anti-phishing_policies_and_attacks.en.srt | 13.1 KB |
| 2 - 2._ATP_Anti-Phishing_Policies/11. ATP_anti-phishing_policies_and_attacks.mp4 | 17.1 MB |
| 2 - 2._ATP_Anti-Phishing_Policies/12. Office_365_ATP_anti-phishing_policies.en.srt | 6.3 KB |
| 2 - 2._ATP_Anti-Phishing_Policies/12. Office_365_ATP_anti-phishing_policies.mp4 | 8.9 MB |
| 2 - 2._ATP_Anti-Phishing_Policies/13. Demo_-_Create_a_new_anti-phishing_policy.en.srt | 4 KB |
| 2 - 2._ATP_Anti-Phishing_Policies/13. Demo_-_Create_a_new_anti-phishing_policy.mp4 | 8.8 MB |
| 2 - 2._ATP_Anti-Phishing_Policies/Thumbs.db | 13 KB |
| 3 - 3._ATP_Safe_Attachments_Policies/14. Enabling_ATP_Safe_Attachments.en.srt | 7.9 KB |
| 3 - 3._ATP_Safe_Attachments_Policies/14. Enabling_ATP_Safe_Attachments.mp4 | 10.7 MB |
| 3 - 3._ATP_Safe_Attachments_Policies/15. Office_365_ATP_Safe_Attachments_policies.en.srt | 6.8 KB |
| 3 - 3._ATP_Safe_Attachments_Policies/15. Office_365_ATP_Safe_Attachments_policies.mp4 | 8.8 MB |
| 3 - 3._ATP_Safe_Attachments_Policies/16. Demo_-_Create_a_new_Safe_Attachments_policy.en.srt | 3.6 KB |
| 3 - 3._ATP_Safe_Attachments_Policies/16. Demo_-_Create_a_new_Safe_Attachments_policy.mp4 | 9.2 MB |
| 3 - 3._ATP_Safe_Attachments_Policies/17. Demo_-_Submit_an_infected_file_to_Microsoft.en.srt | 2.3 KB |
| 3 - 3._ATP_Safe_Attachments_Policies/17. Demo_-_Submit_an_infected_file_to_Microsoft.mp4 | 5.7 MB |
| 4 - 4._ATP_Safe_Links_Policies/18. ATP_Safe_Links.en.srt | 4.3 KB |
| 4 - 4._ATP_Safe_Links_Policies/18. ATP_Safe_Links.mp4 | 6.4 MB |
| 4 - 4._ATP_Safe_Links_Policies/19. ATP_Safe_Links_functionality.en.srt | 4.2 KB |
| 4 - 4._ATP_Safe_Links_Policies/19. ATP_Safe_Links_functionality.mp4 | 6 MB |
| 4 - 4._ATP_Safe_Links_Policies/20. ATP_Safe_Links_policy_options.en.srt | 7.6 KB |
| 4 - 4._ATP_Safe_Links_Policies/20. ATP_Safe_Links_policy_options.mp4 | 11 MB |
| 4 - 4._ATP_Safe_Links_Policies/21. Demo_-_Create_and_manage_Safe_Links.en.srt | 5.3 KB |
| 4 - 4._ATP_Safe_Links_Policies/21. Demo_-_Create_and_manage_Safe_Links.mp4 | 9.9 MB |
| 5 - 5._ATP_Anti-Spam_Policies/22. Overview_of_spam.en.srt | 6.8 KB |
| 5 - 5._ATP_Anti-Spam_Policies/22. Overview_of_spam.mp4 | 9.8 MB |
| 5 - 5._ATP_Anti-Spam_Policies/23. ATP_anti-spam.en.srt | 7.8 KB |
| 5 - 5._ATP_Anti-Spam_Policies/23. ATP_anti-spam.mp4 | 11.2 MB |
| 5 - 5._ATP_Anti-Spam_Policies/24. Demo_-_ATP_anti-spam_settings.en.srt | 7.3 KB |
| 5 - 5._ATP_Anti-Spam_Policies/24. Demo_-_ATP_anti-spam_settings.mp4 | 15.8 MB |
| 5 - 5._ATP_Anti-Spam_Policies/25. Email_spoofing_and_spoof_intelligence.en.srt | 10 KB |
| 5 - 5._ATP_Anti-Spam_Policies/25. Email_spoofing_and_spoof_intelligence.mp4 | 14.4 MB |
| 5 - 5._ATP_Anti-Spam_Policies/26. Demo_-_Managing_spoof_intelligence.en.srt | 1.8 KB |
| 5 - 5._ATP_Anti-Spam_Policies/26. Demo_-_Managing_spoof_intelligence.mp4 | 3.3 MB |
| 5 - 5._ATP_Anti-Spam_Policies/27. Demo_-_Managing_advanced_spoofing_filters.en.srt | 1.4 KB |
| 5 - 5._ATP_Anti-Spam_Policies/27. Demo_-_Managing_advanced_spoofing_filters.mp4 | 3.1 MB |
| 6 - 6._Office_365_Threat_Intelligence/28. Office_365_threat_intelligence.en.srt | 3.4 KB |
| 6 - 6._Office_365_Threat_Intelligence/28. Office_365_threat_intelligence.mp4 | 6.3 MB |
| 6 - 6._Office_365_Threat_Intelligence/29. Threat_intelligence_features.en.srt | 5.9 KB |
| 6 - 6._Office_365_Threat_Intelligence/29. Threat_intelligence_features.mp4 | 9 MB |
| 6 - 6._Office_365_Threat_Intelligence/30. Demo_-_Office_365_threat_intelligence.en.srt | 5.3 KB |
| 6 - 6._Office_365_Threat_Intelligence/30. Demo_-_Office_365_threat_intelligence.mp4 | 10.2 MB |
| 6 - 6._Office_365_Threat_Intelligence/31. Using_Attack_Simulator.en.srt | 7.3 KB |
| 6 - 6._Office_365_Threat_Intelligence/31. Using_Attack_Simulator.mp4 | 10.6 MB |
| 6 - 6._Office_365_Threat_Intelligence/32. Demo_-_Password_spray_attack.en.srt | 6.6 KB |
| 6 - 6._Office_365_Threat_Intelligence/32. Demo_-_Password_spray_attack.mp4 | 14.2 MB |
| 6 - 6._Office_365_Threat_Intelligence/33. Demo_-_Phishing_attack.en.srt | 2.5 KB |
| 6 - 6._Office_365_Threat_Intelligence/33. Demo_-_Phishing_attack.mp4 | 5.1 MB |
| 6 - 6._Office_365_Threat_Intelligence/34. Demo_-_Brute-force_attack.en.srt | 2.8 KB |
| 6 - 6._Office_365_Threat_Intelligence/34. Demo_-_Brute-force_attack.mp4 | 5.9 MB |
| 7 - 7._ATP_Reporting/35. Threat_protection_status_reporting.en.srt | 5.1 KB |
| 7 - 7._ATP_Reporting/35. Threat_protection_status_reporting.mp4 | 7.9 MB |
| 7 - 7._ATP_Reporting/36. ATP_real-time_reports.en.srt | 4.6 KB |
| 7 - 7._ATP_Reporting/36. ATP_real-time_reports.mp4 | 6.7 MB |
| 7 - 7._ATP_Reporting/37. Demo_-_Threat_protection_reporting.en.srt | 3.4 KB |
| 7 - 7._ATP_Reporting/37. Demo_-_Threat_protection_reporting.mp4 | 9.4 MB |
| 7 - 7._ATP_Reporting/38. Threat_management_dashboard.en.srt | 2.5 KB |
| 7 - 7._ATP_Reporting/38. Threat_management_dashboard.mp4 | 3.3 MB |
| 7 - 7._ATP_Reporting/39. Threat_management_dashboard_reports.en.srt | 5.2 KB |
| 7 - 7._ATP_Reporting/39. Threat_management_dashboard_reports.mp4 | 7.1 MB |
| 7 - 7._ATP_Reporting/40. Demo_-_Threat_management_dashboard_reports.en.srt | 1.5 KB |
| 7 - 7._ATP_Reporting/40. Demo_-_Threat_management_dashboard_reports.mp4 | 3 MB |
| 7 - 7._ATP_Reporting/41. Threat_management_review.en.srt | 2.3 KB |
| 7 - 7._ATP_Reporting/41. Threat_management_review.mp4 | 3.1 MB |
| 7 - 7._ATP_Reporting/42. Demo_-_Threat_management_reporting.en.srt | 2.7 KB |
| 7 - 7._ATP_Reporting/42. Demo_-_Threat_management_reporting.mp4 | 4.5 MB |
| 8 - Conclusion/43. Next_steps.en.srt | 784 B |
| 8 - Conclusion/43. Next_steps.mp4 | 1.1 MB |