YoVDO

Threat Detection Response with Hipara

Offered By: YouTube

Tags

Conference Talks Courses Ransomware Courses Encryption Courses Threat Detection Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore threat detection and response strategies using Hipara in this 32-minute conference talk from GrrCon 2016. Delve into topics such as Yard Signature, repositories, and the philosophy behind Hipara. Learn about Yarra, command line logging, and how to tackle ransomware threats. Discover the importance of entropy and encryption in cybersecurity. Gain insights into deployment techniques, web server management, and user interface design for effective threat response. Conclude with a Q&A session to address specific concerns and deepen your understanding of Hipara's capabilities in enhancing cybersecurity measures.

Syllabus

Introduction
Yard Signature
Repositories
What is Hipara
Our philosophy
Yarra
Command Line Logging
Ransomware
Entropy
Encryption
Deployment
Web Server
User Interface
Questions


Related Courses

Cyber Security Foundations: Common Malware Attacks and Defense Strategies
EC-Council via FutureLearn
Cybersecurity Foundations
LinkedIn Learning
The Cybersecurity Threat Landscape
LinkedIn Learning
A Guide to Ransomware Protection
Udemy
Ciberseguridad. Bases y estructuras para la protección de la información
Universidad Anáhuac via edX