Completed
Device Guard Monitoring
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Living Off the Land 2 - A Minimalist's Guide to Windows Defense
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Motivations for "Living off the Land"
- 3 Case for PS Remoting (WinRM)
- 4 PowerShell Remoting
- 5 WMI-based Data Collection
- 6 CimSweep - Introduction
- 7 Intrusion Detection
- 8 WMI Event Basics - Events
- 9 WMI Query Language via PowerShell
- 10 Uproot - Introduction
- 11 ETW Introduction
- 12 ETW Terminology
- 13 Common ETW Usage
- 14 ETW for Incident Response
- 15 ETW Capture Scenario
- 16 Investigation
- 17 PowerForensics - Introduction
- 18 Taking Ideas from the Bad Guys
- 19 Device Guard - Introduction
- 20 Device Guard vs. AppLocker
- 21 Device Guard Monitoring
- 22 Device Guard Bypass Strategies
- 23 Device Guard Bypass Mitigations