detecting command and control frameworks via sysmon and windows event logging
Published 1 month ago • 1.5K plays • Length 28:07Download video MP4
Download video MP3
Similar videos
-
51:01
threat hunting via sysmon - sans blue team summit
-
4:56
using sysmon to analyze a malware sample
-
57:40
windows event forwarding and event collectors in-depth
-
42:16
putting mitre att&ck™ into action with what you have, where you are presented by katie nickels
-
6:51
cybersecurity threat hunting explained
-
24:12
introduction to cyber threat hunting : soc
-
18:25
what's up with sysmon and the windows event viewer?
-
29:55
detecting modern powershell attacks with siem
-
1:11:12
collect all the data. really?
-
1:01:09
detecting modern powershell attacks with siem
-
1:27:05
sysmon for beginners | tryhackme cyber defense lab
-
43:40
ir prep and detection engineering when the cloud is your data center
-
59:44
building a lab for detection | justin henderson
-
37:26
windows logging | sans ics concepts
-
50:40
threat hunting with sysmon for security operations center | tryhackme sysmon
-
19:11
the security show: threat hunting deep dive
-
1:02:42
sans webinar: forensic state analysis - a new approach to cyber threat hunting
-
56:14
107 windows event logs zero to hero nate guagenti adam swan
-
23:49
using endpoint telemetry to accelerate the baseline - sans dfir summit 2016