enabling defenders to conduct incident response investigations with open-source tools
Published 1 year ago • 5.2K plays • Length 32:19Download video MP4
Download video MP3
Similar videos
-
22:19
analysis 101 for incident responders | sans cyber defense forum 2020
-
59:14
faster, better, and cheaper: improving security operations using open source tools
-
57:36
open-source intelligence (osint) digital forensics and incident response (dfir) | live
-
37:46
using open tools to convert threat intelligence into practical defenses: threat hunting summit
-
57:53
handling ransomware incidents: what you need to know!
-
12:30
soc 101: real-time incident response walkthrough
-
9:44
microsoft sentinel incident investigation | free lab
-
37:12
required cybersecurity skill: understanding basic networking concepts
-
5:40
the six phases of incident response
-
6:51
cybersecurity threat hunting explained
-
25:49
open-source dfir made easy: the setup - sans digital forensics & incident response summit 2017
-
5:47
security operations center (soc) explained
-
1:00:39
open-source intelligence plus cyber threat intelligence | live stream series
-
14:43
cyber security operations and incident response course - part 1: soc intro
-
35:11
advanced open-source intelligence (osint) gathering and analysis: a sec587 demo
-
32:21
leveraging osint to track cyber threat actors
-
47:10
applying ds/ml to forensics and incident response: an interview with jess garcia
-
59:44
building a lab for detection | justin henderson
-
1:02:21
network detection and incident response with open source tools
-
48:50
sans dfir webcast - incident response event log analysis
-
16:24
building the better playbook: techniques to improve repeatability | sans cyber defense forum 2020
-
3:40
what is the for528: ransomware for incident responders course all about?