Lynda - Microsoft Office 365 Advanced Threat Protection

Photo unavailable
Category:
Date:
09/23/18 at 11:39am GMT+1
Submitter:
Seeders:
4
Leechers:
0
File size:
348 MB in 86 files

Torrent Status:
  This torrent has been verified.

Infohash:
429cfb62fc2420c855aaaeba802fc6bc2f1efa14


File list

  • Lynda - Microsoft Office 365 Advanced Threat Protection
  • icon 0.Introduction/01.Staying safe with Advanced Threat Protection (ATP).en.srt 1.3 KB
    icon 0.Introduction/01.Staying safe with Advanced Threat Protection (ATP).mp4 3.3 MB
    icon 0.Introduction/02.What you should know.en.srt 1.2 KB
    icon 0.Introduction/02.What you should know.mp4 1.4 MB
    icon 1.1. Implementing Office 365 ATP/03.Protect against threats in Office 365.en.srt 5 KB
    icon 1.1. Implementing Office 365 ATP/03.Protect against threats in Office 365.mp4 7.1 MB
    icon 1.1. Implementing Office 365 ATP/04.Common Office 365 threats.en.srt 9 KB
    icon 1.1. Implementing Office 365 ATP/04.Common Office 365 threats.mp4 13 MB
    icon 1.1. Implementing Office 365 ATP/05.Office 365 data protection measures.en.srt 7.9 KB
    icon 1.1. Implementing Office 365 ATP/05.Office 365 data protection measures.mp4 11 MB
    icon 1.1. Implementing Office 365 ATP/06.Demo - Office 365 Security & Compliance Center.en.srt 3.5 KB
    icon 1.1. Implementing Office 365 ATP/06.Demo - Office 365 Security & Compliance Center.mp4 5.9 MB
    icon 1.1. Implementing Office 365 ATP/07.Office 365 Advanced Threat Protection.en.srt 11.8 KB
    icon 1.1. Implementing Office 365 ATP/07.Office 365 Advanced Threat Protection.mp4 17.8 MB
    icon 1.1. Implementing Office 365 ATP/08.Demo - Threat management console.en.srt 5.5 KB
    icon 1.1. Implementing Office 365 ATP/08.Demo - Threat management console.mp4 10 MB
    icon 1.1. Implementing Office 365 ATP/09.Understanding security admin roles.en.srt 4.7 KB
    icon 1.1. Implementing Office 365 ATP/09.Understanding security admin roles.mp4 7.4 MB
    icon 1.1. Implementing Office 365 ATP/10.Demo - Configure security roles.en.srt 1.9 KB
    icon 1.1. Implementing Office 365 ATP/10.Demo - Configure security roles.mp4 3.9 MB
    icon 2.2. ATP Anti-Phishing Policies/11.ATP anti-phishing policies and attacks.en.srt 13.1 KB
    icon 2.2. ATP Anti-Phishing Policies/11.ATP anti-phishing policies and attacks.mp4 17.1 MB
    icon 2.2. ATP Anti-Phishing Policies/12.Office 365 ATP anti-phishing policies.en.srt 6.3 KB
    icon 2.2. ATP Anti-Phishing Policies/12.Office 365 ATP anti-phishing policies.mp4 8.9 MB
    icon 2.2. ATP Anti-Phishing Policies/13.Demo - Create a new anti-phishing policy.en.srt 4 KB
    icon 2.2. ATP Anti-Phishing Policies/13.Demo - Create a new anti-phishing policy.mp4 8.8 MB
    icon 3.3. ATP Safe Attachments Policies/14.Enabling ATP Safe Attachments.en.srt 7.9 KB
    icon 3.3. ATP Safe Attachments Policies/14.Enabling ATP Safe Attachments.mp4 10.7 MB
    icon 3.3. ATP Safe Attachments Policies/15.Office 365 ATP Safe Attachments policies.en.srt 6.8 KB
    icon 3.3. ATP Safe Attachments Policies/15.Office 365 ATP Safe Attachments policies.mp4 8.8 MB
    icon 3.3. ATP Safe Attachments Policies/16.Demo - Create a new Safe Attachments policy.en.srt 3.6 KB
    icon 3.3. ATP Safe Attachments Policies/16.Demo - Create a new Safe Attachments policy.mp4 9.2 MB
    icon 3.3. ATP Safe Attachments Policies/17.Demo - Submit an infected file to Microsoft.en.srt 2.3 KB
    icon 3.3. ATP Safe Attachments Policies/17.Demo - Submit an infected file to Microsoft.mp4 5.7 MB
    icon 4.4. ATP Safe Links Policies/18.ATP Safe Links.en.srt 4.3 KB
    icon 4.4. ATP Safe Links Policies/18.ATP Safe Links.mp4 6.4 MB
    icon 4.4. ATP Safe Links Policies/19.ATP Safe Links functionality.en.srt 4.2 KB
    icon 4.4. ATP Safe Links Policies/19.ATP Safe Links functionality.mp4 6 MB
    icon 4.4. ATP Safe Links Policies/20.ATP Safe Links policy options.en.srt 7.6 KB
    icon 4.4. ATP Safe Links Policies/20.ATP Safe Links policy options.mp4 11 MB
    icon 4.4. ATP Safe Links Policies/21.Demo - Create and manage Safe Links.en.srt 5.3 KB
    icon 4.4. ATP Safe Links Policies/21.Demo - Create and manage Safe Links.mp4 9.9 MB
    icon 5.5. ATP Anti-Spam Policies/22.Overview of spam.en.srt 6.8 KB
    icon 5.5. ATP Anti-Spam Policies/22.Overview of spam.mp4 9.8 MB
    icon 5.5. ATP Anti-Spam Policies/23.ATP anti-spam.en.srt 7.8 KB
    icon 5.5. ATP Anti-Spam Policies/23.ATP anti-spam.mp4 11.2 MB
    icon 5.5. ATP Anti-Spam Policies/24.Demo - ATP anti-spam settings.en.srt 7.3 KB
    icon 5.5. ATP Anti-Spam Policies/24.Demo - ATP anti-spam settings.mp4 15.8 MB
    icon 5.5. ATP Anti-Spam Policies/25.Email spoofing and spoof intelligence.en.srt 10 KB
    icon 5.5. ATP Anti-Spam Policies/25.Email spoofing and spoof intelligence.mp4 14.4 MB
    icon 5.5. ATP Anti-Spam Policies/26.Demo - Managing spoof intelligence.en.srt 1.8 KB
    icon 5.5. ATP Anti-Spam Policies/26.Demo - Managing spoof intelligence.mp4 3.3 MB
    icon 5.5. ATP Anti-Spam Policies/27.Demo - Managing advanced spoofing filters.en.srt 1.4 KB
    icon 5.5. ATP Anti-Spam Policies/27.Demo - Managing advanced spoofing filters.mp4 3.1 MB
    icon 6.6. Office 365 Threat Intelligence/28.Office 365 threat intelligence.en.srt 3.4 KB
    icon 6.6. Office 365 Threat Intelligence/28.Office 365 threat intelligence.mp4 6.3 MB
    icon 6.6. Office 365 Threat Intelligence/29.Threat intelligence features.en.srt 5.9 KB
    icon 6.6. Office 365 Threat Intelligence/29.Threat intelligence features.mp4 9 MB
    icon 6.6. Office 365 Threat Intelligence/30.Demo - Office 365 threat intelligence.en.srt 5.3 KB
    icon 6.6. Office 365 Threat Intelligence/30.Demo - Office 365 threat intelligence.mp4 10.2 MB
    icon 6.6. Office 365 Threat Intelligence/31.Using Attack Simulator.en.srt 7.3 KB
    icon 6.6. Office 365 Threat Intelligence/31.Using Attack Simulator.mp4 10.6 MB
    icon 6.6. Office 365 Threat Intelligence/32.Demo - Password spray attack.en.srt 6.6 KB
    icon 6.6. Office 365 Threat Intelligence/32.Demo - Password spray attack.mp4 14.2 MB
    icon 6.6. Office 365 Threat Intelligence/33.Demo - Phishing attack.en.srt 2.5 KB
    icon 6.6. Office 365 Threat Intelligence/33.Demo - Phishing attack.mp4 5.1 MB
    icon 6.6. Office 365 Threat Intelligence/34.Demo - Brute-force attack.en.srt 2.8 KB
    icon 6.6. Office 365 Threat Intelligence/34.Demo - Brute-force attack.mp4 5.9 MB
    icon 7.7. ATP Reporting/35.Threat protection status reporting.en.srt 5.1 KB
    icon 7.7. ATP Reporting/35.Threat protection status reporting.mp4 7.9 MB
    icon 7.7. ATP Reporting/36.ATP real-time reports.en.srt 4.6 KB
    icon 7.7. ATP Reporting/36.ATP real-time reports.mp4 6.7 MB
    icon 7.7. ATP Reporting/37.Demo - Threat protection reporting.en.srt 3.4 KB
    icon 7.7. ATP Reporting/37.Demo - Threat protection reporting.mp4 9.4 MB
    icon 7.7. ATP Reporting/38.Threat management dashboard.en.srt 2.5 KB
    icon 7.7. ATP Reporting/38.Threat management dashboard.mp4 3.3 MB
    icon 7.7. ATP Reporting/39.Threat management dashboard reports.en.srt 5.2 KB
    icon 7.7. ATP Reporting/39.Threat management dashboard reports.mp4 7.1 MB
    icon 7.7. ATP Reporting/40.Demo - Threat management dashboard reports.en.srt 1.5 KB
    icon 7.7. ATP Reporting/40.Demo - Threat management dashboard reports.mp4 3 MB
    icon 7.7. ATP Reporting/41.Threat management review.en.srt 2.3 KB
    icon 7.7. ATP Reporting/41.Threat management review.mp4 3.1 MB
    icon 7.7. ATP Reporting/42.Demo - Threat management reporting.en.srt 2.7 KB
    icon 7.7. ATP Reporting/42.Demo - Threat management reporting.mp4 4.5 MB
    icon 8.Conclusion/43.Next steps.en.srt 784 B
    icon 8.Conclusion/43.Next steps.mp4 1.1 MB

Similar Torrents