Lynda - Learning System Center 2016 Endpoint Protection/1. Introduction/01. Welcome.mp4 |
5.9 MB |
Lynda - Learning System Center 2016 Endpoint Protection/1. Introduction/02. What you should know.mp4 |
1.8 MB |
Lynda - Learning System Center 2016 Endpoint Protection/1. Introduction/03. How to use the exercise files.mp4 |
497 KB |
Lynda - Learning System Center 2016 Endpoint Protection/1. Introduction/01. Welcome.en.srt |
2 KB |
Lynda - Learning System Center 2016 Endpoint Protection/1. Introduction/02. What you should know.en.srt |
2 KB |
Lynda - Learning System Center 2016 Endpoint Protection/1. Introduction/03. How to use the exercise files.en.srt |
747 B |
Lynda - Learning System Center 2016 Endpoint Protection/2. 1. Defining Malware Types/07. Phishing and ransomware.mp4 |
8.3 MB |
Lynda - Learning System Center 2016 Endpoint Protection/2. 1. Defining Malware Types/06. Viruses, trojans, and rootkits.mp4 |
6.8 MB |
Lynda - Learning System Center 2016 Endpoint Protection/2. 1. Defining Malware Types/08. Network vulnerability detection.mp4 |
6 MB |
Lynda - Learning System Center 2016 Endpoint Protection/2. 1. Defining Malware Types/04. Social engineering.mp4 |
5.3 MB |
Lynda - Learning System Center 2016 Endpoint Protection/2. 1. Defining Malware Types/05. Spyware and adware.mp4 |
4.3 MB |
Lynda - Learning System Center 2016 Endpoint Protection/2. 1. Defining Malware Types/07. Phishing and ransomware.en.srt |
10 KB |
Lynda - Learning System Center 2016 Endpoint Protection/2. 1. Defining Malware Types/06. Viruses, trojans, and rootkits.en.srt |
8 KB |
Lynda - Learning System Center 2016 Endpoint Protection/2. 1. Defining Malware Types/08. Network vulnerability detection.en.srt |
7 KB |
Lynda - Learning System Center 2016 Endpoint Protection/2. 1. Defining Malware Types/04. Social engineering.en.srt |
6 KB |
Lynda - Learning System Center 2016 Endpoint Protection/2. 1. Defining Malware Types/05. Spyware and adware.en.srt |
5 KB |
Lynda - Learning System Center 2016 Endpoint Protection/3. 2 Getting Endpoint Protection Up and Running/11. Deploy the SCEP Windows client.mp4 |
11.9 MB |
Lynda - Learning System Center 2016 Endpoint Protection/3. 2 Getting Endpoint Protection Up and Running/09. Server requirements.mp4 |
9.6 MB |
Lynda - Learning System Center 2016 Endpoint Protection/3. 2 Getting Endpoint Protection Up and Running/10. Supported clients.mp4 |
9.4 MB |
Lynda - Learning System Center 2016 Endpoint Protection/3. 2 Getting Endpoint Protection Up and Running/12. Remove malware on a SCEP client.mp4 |
7.8 MB |
Lynda - Learning System Center 2016 Endpoint Protection/3. 2 Getting Endpoint Protection Up and Running/10. Supported clients.en.srt |
10 KB |
Lynda - Learning System Center 2016 Endpoint Protection/3. 2 Getting Endpoint Protection Up and Running/09. Server requirements.en.srt |
9 KB |
Lynda - Learning System Center 2016 Endpoint Protection/3. 2 Getting Endpoint Protection Up and Running/11. Deploy the SCEP Windows client.en.srt |
8 KB |
Lynda - Learning System Center 2016 Endpoint Protection/3. 2 Getting Endpoint Protection Up and Running/12. Remove malware on a SCEP client.en.srt |
6 KB |
Lynda - Learning System Center 2016 Endpoint Protection/4. 3. Endpoint Protection Policies/19. Configure an Automatic Deployment Rule.mp4 |
19.3 MB |
Lynda - Learning System Center 2016 Endpoint Protection/4. 3. Endpoint Protection Policies/15. Custom policies and priority order.mp4 |
10.5 MB |
Lynda - Learning System Center 2016 Endpoint Protection/4. 3. Endpoint Protection Policies/16. Policy settings.mp4 |
10.4 MB |
Lynda - Learning System Center 2016 Endpoint Protection/4. 3. Endpoint Protection Policies/17. Configure custom policies.mp4 |
10 MB |
Lynda - Learning System Center 2016 Endpoint Protection/4. 3. Endpoint Protection Policies/18. Plan an update strategy.mp4 |
9.4 MB |
Lynda - Learning System Center 2016 Endpoint Protection/4. 3. Endpoint Protection Policies/14. Default policy.mp4 |
8.4 MB |
Lynda - Learning System Center 2016 Endpoint Protection/4. 3. Endpoint Protection Policies/21. Windows Advanced Threat Protection.mp4 |
7.3 MB |
Lynda - Learning System Center 2016 Endpoint Protection/4. 3. Endpoint Protection Policies/13. Hardening.mp4 |
6.3 MB |
Lynda - Learning System Center 2016 Endpoint Protection/4. 3. Endpoint Protection Policies/20. Windows firewall settings.mp4 |
5.7 MB |
Lynda - Learning System Center 2016 Endpoint Protection/4. 3. Endpoint Protection Policies/19. Configure an Automatic Deployment Rule.en.srt |
12 KB |
Lynda - Learning System Center 2016 Endpoint Protection/4. 3. Endpoint Protection Policies/15. Custom policies and priority order.en.srt |
11 KB |
Lynda - Learning System Center 2016 Endpoint Protection/4. 3. Endpoint Protection Policies/16. Policy settings.en.srt |
10 KB |
Lynda - Learning System Center 2016 Endpoint Protection/4. 3. Endpoint Protection Policies/18. Plan an update strategy.en.srt |
9 KB |
Lynda - Learning System Center 2016 Endpoint Protection/4. 3. Endpoint Protection Policies/14. Default policy.en.srt |
8 KB |
Lynda - Learning System Center 2016 Endpoint Protection/4. 3. Endpoint Protection Policies/21. Windows Advanced Threat Protection.en.srt |
8 KB |
Lynda - Learning System Center 2016 Endpoint Protection/4. 3. Endpoint Protection Policies/13. Hardening.en.srt |
8 KB |
Lynda - Learning System Center 2016 Endpoint Protection/4. 3. Endpoint Protection Policies/17. Configure custom policies.en.srt |
7 KB |
Lynda - Learning System Center 2016 Endpoint Protection/4. 3. Endpoint Protection Policies/20. Windows firewall settings.en.srt |
7 KB |
Lynda - Learning System Center 2016 Endpoint Protection/5. 4. Monitoring Endpoint Protection/26. Reports.mp4 |
14.8 MB |
Lynda - Learning System Center 2016 Endpoint Protection/5. 4. Monitoring Endpoint Protection/23. Using PowerShell cmdlets for monitoring.mp4 |
13.5 MB |
Lynda - Learning System Center 2016 Endpoint Protection/5. 4. Monitoring Endpoint Protection/22. In-console monitoring.mp4 |
12.4 MB |
Lynda - Learning System Center 2016 Endpoint Protection/5. 4. Monitoring Endpoint Protection/24. Client logs and WMI queries.mp4 |
12 MB |
Lynda - Learning System Center 2016 Endpoint Protection/5. 4. Monitoring Endpoint Protection/25. Alerts and subscriptions.mp4 |
10.1 MB |
Lynda - Learning System Center 2016 Endpoint Protection/5. 4. Monitoring Endpoint Protection/26. Reports.en.srt |
14 KB |
Lynda - Learning System Center 2016 Endpoint Protection/5. 4. Monitoring Endpoint Protection/23. Using PowerShell cmdlets for monitoring.en.srt |
13 KB |
Lynda - Learning System Center 2016 Endpoint Protection/5. 4. Monitoring Endpoint Protection/22. In-console monitoring.en.srt |
11 KB |
Lynda - Learning System Center 2016 Endpoint Protection/5. 4. Monitoring Endpoint Protection/24. Client logs and WMI queries.en.srt |
9 KB |
Lynda - Learning System Center 2016 Endpoint Protection/5. 4. Monitoring Endpoint Protection/25. Alerts and subscriptions.en.srt |
9 KB |
Lynda - Learning System Center 2016 Endpoint Protection/6. Conclusion/27. Next steps.mp4 |
3.3 MB |
Lynda - Learning System Center 2016 Endpoint Protection/6. Conclusion/27. Next steps.en.srt |
2 KB |
Lynda - Learning System Center 2016 Endpoint Protection/Exercise Files/02_04/ViewDetectedThreats.ps1 |
116 B |
Lynda - Learning System Center 2016 Endpoint Protection/Exercise Files/03_04/ReqQuery_AppliedPolicies.ps1 |
116 B |
Lynda - Learning System Center 2016 Endpoint Protection/Exercise Files/04_02/Endpoint_PowerShell_Cmdlets.ps1 |
323 B |
Lynda - Learning System Center 2016 Endpoint Protection/Exercise Files/04_02/Win10_Defender_PowerShell.ps1 |
148 B |
Lynda - Learning System Center 2016 Endpoint Protection/Exercise Files/04_03/WMIQuery.ps1 |
108 B |
Lynda - Learning System Center 2016 Endpoint Protection/Exercise Files/04_03/Icon |
0 B |