Plotting Hackers - Visualizing Attack Patterns
Offered By: YouTube
Course Description
Overview
Explore attack patterns and visualization techniques in this 50-minute conference talk from BSides Detroit 2017. Dive into log analysis, data parsing, and visualization methods to better understand hacker behavior. Learn about proxy web gems, authorization APIs, and Elastic Search APIs for improved log management. Discover how to create meaningful pie charts and other visual representations to effectively communicate security insights and identify potential threats.
Syllabus
Introduction
Sharing is Caring
Context
Logs
Visualization
Proxy Web Gem
Authorization API
Elastic Search API
Last Search Proxy
Log Management Visualization
Pie Charts
Data parsing
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network