12 Days of Defense - Day 5: How Windows Security Logging Works

12:23
12 Days of Defense - Day 6: How DNS over HTTPS (DoH) Works / DNS Privacy

28:06
The One About The Windows Event Log

16:34
12 Days of Defense - Day 1: PDF and Office Doc Malware IOC Extraction

33:02
Windows Event Forwarding at Scale

18:33
12 Days of Defense - Day 3: How the SOC Works (Security Monitoring Tools and Architecture)

3:31:01
İş İçin Gece Müziği — Konsantrasyon için Derin Gelecek Garaj Karışımı

2:03:38
Güldür Güldür Show 395. Bölüm

3:25:28