Filename | Size |
| ~Get Your Files Here !/02/remote-email-collection-t1114002-slides.pdf | 529.6 KB |
| ~Get Your Files Here !/03/endpoint-denial-of-service-t1499002-slides.pdf | 994 KB |
| ~Get Your Files Here !/04/demos/csv_to_json.py | 661 B |
| ~Get Your Files Here !/04/internal-spearphishing-t1534-slides.pdf | 1.7 MB |
| ~Get Your Files Here !/1. Course Overview/1. Course Overview.mp4 | 2 MB |
| ~Get Your Files Here !/1. Course Overview/1. Course Overview.vtt | 1.4 KB |
| ~Get Your Files Here !/2. Remote Email Collection (T1114.002)/1. Introduction.mp4 | 2.9 MB |
| ~Get Your Files Here !/2. Remote Email Collection (T1114.002)/1. Introduction.vtt | 2.8 KB |
| ~Get Your Files Here !/2. Remote Email Collection (T1114.002)/2. Perform Remote Email Collection Using MailSniper.mp4 | 14.8 MB |
| ~Get Your Files Here !/2. Remote Email Collection (T1114.002)/2. Perform Remote Email Collection Using MailSniper.vtt | 7.8 KB |
| ~Get Your Files Here !/2. Remote Email Collection (T1114.002)/3. Monitoring Using ELK Stack.mp4 | 9.5 MB |
| ~Get Your Files Here !/2. Remote Email Collection (T1114.002)/3. Monitoring Using ELK Stack.vtt | 7.6 KB |
| ~Get Your Files Here !/2. Remote Email Collection (T1114.002)/4. Identifying Remote Email Collection Threats.mp4 | 25.6 MB |
| ~Get Your Files Here !/2. Remote Email Collection (T1114.002)/4. Identifying Remote Email Collection Threats.vtt | 11.4 KB |
| ~Get Your Files Here !/3. Endpoint Denial of Service (T1499.002)/1. Analyzing a DoS Attack Script.mp4 | 9.8 MB |
| ~Get Your Files Here !/3. Endpoint Denial of Service (T1499.002)/1. Analyzing a DoS Attack Script.vtt | 10.1 KB |
| ~Get Your Files Here !/3. Endpoint Denial of Service (T1499.002)/2. Monitoring Network Traffic Content.mp4 | 9.9 MB |
| ~Get Your Files Here !/3. Endpoint Denial of Service (T1499.002)/2. Monitoring Network Traffic Content.vtt | 7.7 KB |
| ~Get Your Files Here !/3. Endpoint Denial of Service (T1499.002)/3. Filtering Network Traffic.mp4 | 8.3 MB |
| ~Get Your Files Here !/3. Endpoint Denial of Service (T1499.002)/3. Filtering Network Traffic.vtt | 6.9 KB |
| ~Get Your Files Here !/4. Internal Spearphishing (T1534)/1. Analyzing Malicious Payloads in Emails.mp4 | 9.8 MB |
| ~Get Your Files Here !/4. Internal Spearphishing (T1534)/1. Analyzing Malicious Payloads in Emails.vtt | 8.3 KB |
| ~Get Your Files Here !/4. Internal Spearphishing (T1534)/2. Serializing Email Data.mp4 | 9.5 MB |
| ~Get Your Files Here !/4. Internal Spearphishing (T1534)/2. Serializing Email Data.vtt | 6.2 KB |
| ~Get Your Files Here !/4. Internal Spearphishing (T1534)/3. Identifying Phishing Attempts Using ElasticSearch.mp4 | 8.1 MB |
| ~Get Your Files Here !/4. Internal Spearphishing (T1534)/3. Identifying Phishing Attempts Using ElasticSearch.vtt | 7.1 KB |
| ~Get Your Files Here !/Bonus Resources.txt | 386 B |