YoVDO

Collect All the Data - Protect All the Things

Offered By: YouTube

Tags

DerbyCon Courses Cybersecurity Courses Graph Theory Courses Data Collection Courses Network Analysis Courses Threat Detection Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive conference talk that delves into data collection and protection strategies across various domains. Learn about network and machine data, Windows logs, graph theory, and air gap popping techniques. Discover insights on hardware supply chain interdiction, endpoint analysis, asset detection, and network sigma. Gain knowledge about OS query, application data utilization, protocol metadata, and the role of J3 and Salesforce in data management. Understand the analyst's perspective, intelligence operations workflow, and the concept of Protoss. Examine outliers and J3 ER to round out your understanding of modern data collection and protection methodologies.

Syllabus

Intro
Pluralsight
Presentation Overview
Network
Machine Data
Windows Logs
Graph Theory
AirGap Popping
Hardware Supply Chain Interdiction
Endpoint Analysis
Asset Detection
Network Sigma
OS Query
Application Data
As Your Sentinel
Protocol Metadata
J3 and Salesforce
The Analyst
Intelligence
Operations Workflow
Protoss
Outliers
J3 ER


Related Courses

Powershell and Windows Throw the Best Shell Parties
YouTube
Rawr - Rapid Assessment of Web Resources
YouTube
Metasploit Town Hall - Redubbed
YouTube
Hunting Webshells - Tracking TwoFace
YouTube
Incident Response on macOS - Thomas Reed
YouTube