ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

How to Cyber Threat Hunt

Автор: Active Countermeasures

Загружено: 2020-03-30

Просмотров: 10861

Описание: Want to level up your threat-hunting knowledge? Take our FREE, hands-on threat hunt training course: https://www.activecountermeasures.com...
Join the ACM Discord Community:   / discord  
0:00 - Forming Voltron
2:46 - Bad Guys, Bad Guys, Watcha Gonna Do When We Don't Catch You
10:19 - Can You Log Me Now?
13:14 - Catching Bad Guys Wearing Parachute Pants
21:26 - It's Threat Hunting Season
32:51 - Bad Guy Glasses
37:01 - Threat Scores and Seven IPs To Go
42:08 - Perfect Is As Perfect Does
44:38 - By The Power Of Discord
45:53 - Questions From the Floor?

Have you noticed that two people can be talking about cyber threat hunting and actually be talking about two different things? It's kind of turned into this "thing" that everyone is talking about, but no one is really sure what it means. What is step #1? How do you know when a threat hunt is "done"? Is there a defined job description for a Cyber Threat Hunter? Clearly, it's time to create some guardrails around the topic.

Download Slides: https://www.activecountermeasures.com...


Active Countermeasures Socials
Twitter:   / activecmeasures  
LinkedIn:   / active-countermeasures  
Discord:   / discord  

Our Threat Hunting Tool ~ AC-Hunter (Formally AI-Hunter)
Features - https://www.activecountermeasures.com...
Interactive Demo Space - https://www.activecountermeasures.com...

Active Countermeasures Open-Source Tools
https://www.activecountermeasures.com...

Educational Threat Hunting Content
FREE 6-Hour Threat Hunt Training: https://www.activecountermeasures.com...
Active Countermeasures Blog: https://www.activecountermeasures.com...
Active Countermeasures YouTube:    / activecountermeasures  

Learn Threat Hunting Skills from Antisyphon Training
Entry-Level (Pay-What-You-Can): https://www.antisyphontraining.com/pa...
Advanced: https://www.antisyphontraining.com/ad...

Active Countermeasures Shirts
https://spearphish-general-store.mysh...

Our Tribe
Black Hills Infosec: https://www.blackhillsinfosec.com/
Wild West Hackin' Fest: https://wildwesthackinfest.com/
Antisyphon Training: https://www.antisyphontraining.com/

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
How to Cyber Threat Hunt

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

Why You Need Threat Hunting!

Why You Need Threat Hunting!

Threat Hunting Beacon Analysis

Threat Hunting Beacon Analysis

Веб-трансляция SANS — Не доверяйте никому: Представляем SEC530: Защищённая архитектура безопасности

Веб-трансляция SANS — Не доверяйте никому: Представляем SEC530: Защищённая архитектура безопасности

License to Kill: Malware Hunting with the Sysinternals Tools

License to Kill: Malware Hunting with the Sysinternals Tools

Threat Hunting Tutorial- Day1

Threat Hunting Tutorial- Day1

Threat Hunting Tutorial: Introduction

Threat Hunting Tutorial: Introduction

ACM Webcast: Network Threat Hunting Runbook

ACM Webcast: Network Threat Hunting Runbook

How to Build a Home Lab – Bill Stearns

How to Build a Home Lab – Bill Stearns

Getting Started with RITA (Real Intelligence Threat Analytics) Chris Brenton | 1 Hour

Getting Started with RITA (Real Intelligence Threat Analytics) Chris Brenton | 1 Hour

A | C - Cyber Threat Hunting Level 1 | Chris Brenton | Tuesday October 4th, 2022 | 6 Hours

A | C - Cyber Threat Hunting Level 1 | Chris Brenton | Tuesday October 4th, 2022 | 6 Hours

Command & Convo - The C2 Webcast - Episode 1: Fiesta

Command & Convo - The C2 Webcast - Episode 1: Fiesta

An Introduction to Threat Hunting With Zeek (Bro)

An Introduction to Threat Hunting With Zeek (Bro)

Threat Hunting in the Modern SOC with Splunk

Threat Hunting in the Modern SOC with Splunk

DFIR 101: Digital Forensics Essentials | Kathryn Hedley

DFIR 101: Digital Forensics Essentials | Kathryn Hedley

How to Build Threat Hunting into Your Security Operations | Red Canary

How to Build Threat Hunting into Your Security Operations | Red Canary

BZAR – Hunting Adversary Behaviors with Zeek and ATT&CK - SANS THIR Summit 2019

BZAR – Hunting Adversary Behaviors with Zeek and ATT&CK - SANS THIR Summit 2019

The Cycle of Cyber Threat Intelligence

The Cycle of Cyber Threat Intelligence

Поиск киберугроз: выявление и выслеживание злоумышленников

Поиск киберугроз: выявление и выслеживание злоумышленников

Command & Convo - Episode 4: Building Your Own Threat Hunting Home Lab

Command & Convo - Episode 4: Building Your Own Threat Hunting Home Lab

Threat Hunting — Demystified

Threat Hunting — Demystified

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]