YoVDO

Plotting Hackers - Visualizing Attack Patterns

Offered By: YouTube

Tags

Security BSides Courses Cybersecurity Courses Log Management Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore attack patterns and visualization techniques in this 50-minute conference talk from BSides Detroit 2017. Dive into log analysis, data parsing, and visualization methods to better understand hacker behavior. Learn about proxy web gems, authorization APIs, and Elastic Search APIs for improved log management. Discover how to create meaningful pie charts and other visual representations to effectively communicate security insights and identify potential threats.

Syllabus

Introduction
Sharing is Caring
Context
Logs
Visualization
Proxy Web Gem
Authorization API
Elastic Search API
Last Search Proxy
Log Management Visualization
Pie Charts
Data parsing


Related Courses

Early Detection through Deception
YouTube
Hack for Show, Report for Dough - Brian King
YouTube
Blue Teamin on a Budget of Zero - Kyle Bubp
YouTube
Windows Event Logs - Zero to Hero
YouTube
Weaponizing Splunk - Using Blue Team Tools for Evil
YouTube