Filename Size ~Get Your Files Here !/02/remote-email-collection-t1114002-slides.pdf 529.6 KB ~Get Your Files Here !/03/endpoint-denial-of-service-t1499002-slides.pdf 994 KB ~Get Your Files Here !/04/demos/csv_to_json.py 661 B ~Get Your Files Here !/04/internal-spearphishing-t1534-slides.pdf 1.7 MB ~Get Your Files Here !/1. Course Overview/1. Course Overview.mp4 2 MB ~Get Your Files Here !/1. Course Overview/1. Course Overview.vtt 1.4 KB ~Get Your Files Here !/2. Remote Email Collection (T1114.002)/1. Introduction.mp4 2.9 MB ~Get Your Files Here !/2. Remote Email Collection (T1114.002)/1. Introduction.vtt 2.8 KB ~Get Your Files Here !/2. Remote Email Collection (T1114.002)/2. Perform Remote Email Collection Using MailSniper.mp4 14.8 MB ~Get Your Files Here !/2. Remote Email Collection (T1114.002)/2. Perform Remote Email Collection Using MailSniper.vtt 7.8 KB ~Get Your Files Here !/2. Remote Email Collection (T1114.002)/3. Monitoring Using ELK Stack.mp4 9.5 MB ~Get Your Files Here !/2. Remote Email Collection (T1114.002)/3. Monitoring Using ELK Stack.vtt 7.6 KB ~Get Your Files Here !/2. Remote Email Collection (T1114.002)/4. Identifying Remote Email Collection Threats.mp4 25.6 MB ~Get Your Files Here !/2. Remote Email Collection (T1114.002)/4. Identifying Remote Email Collection Threats.vtt 11.4 KB ~Get Your Files Here !/3. Endpoint Denial of Service (T1499.002)/1. Analyzing a DoS Attack Script.mp4 9.8 MB ~Get Your Files Here !/3. Endpoint Denial of Service (T1499.002)/1. Analyzing a DoS Attack Script.vtt 10.1 KB ~Get Your Files Here !/3. Endpoint Denial of Service (T1499.002)/2. Monitoring Network Traffic Content.mp4 9.9 MB ~Get Your Files Here !/3. Endpoint Denial of Service (T1499.002)/2. Monitoring Network Traffic Content.vtt 7.7 KB ~Get Your Files Here !/3. Endpoint Denial of Service (T1499.002)/3. Filtering Network Traffic.mp4 8.3 MB ~Get Your Files Here !/3. Endpoint Denial of Service (T1499.002)/3. Filtering Network Traffic.vtt 6.9 KB ~Get Your Files Here !/4. Internal Spearphishing (T1534)/1. Analyzing Malicious Payloads in Emails.mp4 9.8 MB ~Get Your Files Here !/4. Internal Spearphishing (T1534)/1. Analyzing Malicious Payloads in Emails.vtt 8.3 KB ~Get Your Files Here !/4. Internal Spearphishing (T1534)/2. Serializing Email Data.mp4 9.5 MB ~Get Your Files Here !/4. Internal Spearphishing (T1534)/2. Serializing Email Data.vtt 6.2 KB ~Get Your Files Here !/4. Internal Spearphishing (T1534)/3. Identifying Phishing Attempts Using ElasticSearch.mp4 8.1 MB ~Get Your Files Here !/4. Internal Spearphishing (T1534)/3. Identifying Phishing Attempts Using ElasticSearch.vtt 7.1 KB ~Get Your Files Here !/Bonus Resources.txt 386 B