YoVDO

Log Analysis Courses

Network Attack Traffic and Data Mining - Lab 6
Bill Buchanan OBE via YouTube
SCADA Attack Detection
RSA Conference via YouTube
BECs and Beyond - Investigating and Defending Office 365
0xdade via YouTube
Using Hadoop for Malware, Network, Forensics and Log Analysis
44CON Information Security Conference via YouTube
Sigma - Generic Signatures for Log Events
Cooper via YouTube
Continuous Integration with Red Hat Cloud Solutions
Red Hat via YouTube
Azure LOG ANALYTICS Inside-Out
Udemy
NetFlow? Where We're Going, We Don't Need NetFlow - Enhancing Threat Hunting and Blue Team Operations
LASCON via YouTube
PowerShell Classification - Life, Learning, and Self-Discovery
BSidesLV via YouTube
StreamAlert: A Serverless Real-time Intrusion Detection Engine
USENIX Enigma Conference via YouTube
< Prev Page 5 Next >