Threat Detection Response with Hipara
Offered By: YouTube
Course Description
Overview
Explore threat detection and response strategies using Hipara in this conference talk from GrrCon 2016. Gain insights into Hipara's signature-based approach, repository management, and endpoint philosophy. Learn about Yarra implementation, commandline logging techniques, and ransomware detection methods focusing on entropy and encryption. Discover deployment strategies, web server setup, and user interface design for effective threat management. Engage with a comprehensive overview of Hipara's capabilities in cybersecurity, concluding with a Q&A session to address specific concerns and applications.
Syllabus
Introduction
About Hipara
Hipara signature
Repositories
Endpoint
Philosophy
Yarra
Commandline Logging
Commandline Review
Ransomware
Entropy
Encryption
Deployment
Web Server
User Interface
Questions
Related Courses
Building Geospatial Apps on Postgres, PostGIS, & Citus at Large ScaleMicrosoft via YouTube Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube What's New in Grails 2.0
ChariotSolutions via YouTube Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube