Sweet Security - Deploying a Defensive Raspberry Pi
Offered By: Security BSides San Francisco via YouTube
Course Description
Overview
Explore how to deploy a defensive Raspberry Pi for IoT security in this 36-minute conference talk from BSidesSF 2016. Learn about using open-source software and free tools to monitor, protect, and mitigate threats in IoT environments. Discover the implementation of Network Security Monitoring, Log Stash, Elastic Search Database, and Kabana on inexpensive hardware. Dive into log normalization, custom patterns, conditional statements, GeoIP integration, and email alerts. Gain insights on creating Cabana dashboards, incorporating threat intel feeds, and setting up network scanning. Understand the benefits of Suite Security, auto-patching, and firewall integration. Get recommendations for cost-effective solutions using Raspberry Pi 3 and explore the potential of Security Onion for enhanced protection.
Syllabus
Introduction
Network Security Monitoring
Log Stash
Elastic Search Database
Logstash
Install Kabana
Log Stash Configuration File
Log Normalization
Custom Patterns
Normalization
Conditional Statements
GeoIP
Remove key fields
Date matching
Translate
Dictionary Hash
External Sources
Email Output Plugin
Email Alerts
Cabana Dashboard
Threat Intel Feed
GeoIP Map
Scripting
Environment Overview
Leonardo DiCaprio
Network Scanning
Suite Security
Recommendations
Email Alert
Service Safe
Auto patching
Cost
Raspberry Pi 3
Firewall Integration
Security Onion
Wrapup
Dots in rows logs
Have I had a chance to play with 22
Any other questions
Taught by
Security BSides San Francisco
Related Courses
Early Detection through DeceptionYouTube Hack for Show, Report for Dough - Brian King
YouTube Blue Teamin on a Budget of Zero - Kyle Bubp
YouTube Windows Event Logs - Zero to Hero
YouTube Weaponizing Splunk - Using Blue Team Tools for Evil
YouTube