YoVDO

Collect All the Data - Protect All the Things

Offered By: YouTube

Tags

DerbyCon Courses Cybersecurity Courses Graph Theory Courses Data Collection Courses Network Analysis Courses Threat Detection Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive conference talk that delves into data collection and protection strategies across various domains. Learn about network and machine data, Windows logs, graph theory, and air gap popping techniques. Discover insights on hardware supply chain interdiction, endpoint analysis, asset detection, and network sigma. Gain knowledge about OS query, application data utilization, protocol metadata, and the role of J3 and Salesforce in data management. Understand the analyst's perspective, intelligence operations workflow, and the concept of Protoss. Examine outliers and J3 ER to round out your understanding of modern data collection and protection methodologies.

Syllabus

Intro
Pluralsight
Presentation Overview
Network
Machine Data
Windows Logs
Graph Theory
AirGap Popping
Hardware Supply Chain Interdiction
Endpoint Analysis
Asset Detection
Network Sigma
OS Query
Application Data
As Your Sentinel
Protocol Metadata
J3 and Salesforce
The Analyst
Intelligence
Operations Workflow
Protoss
Outliers
J3 ER


Related Courses

Aplicaciones de la teoría de grafos a la vida real
Miríadax
Aplicaciones de la Teoría de Grafos a la vida real
Universitat Politècnica de València via UPV [X]
Introduction to Computational Thinking and Data Science
Massachusetts Institute of Technology via edX
Genome Sequencing (Bioinformatics II)
University of California, San Diego via Coursera
Algorithmic Information Dynamics: From Networks to Cells
Santa Fe Institute via Complexity Explorer