YoVDO

Sweet Security - Deploying a Defensive Raspberry Pi

Offered By: Security BSides San Francisco via YouTube

Tags

Security BSides Courses Raspberry Pi Courses IoT security Courses Network Security Monitoring Courses

Course Description

Overview

Explore how to deploy a defensive Raspberry Pi for IoT security in this 36-minute conference talk from BSidesSF 2016. Learn about using open-source software and free tools to monitor, protect, and mitigate threats in IoT environments. Discover the implementation of Network Security Monitoring, Log Stash, Elastic Search Database, and Kabana on inexpensive hardware. Dive into log normalization, custom patterns, conditional statements, GeoIP integration, and email alerts. Gain insights on creating Cabana dashboards, incorporating threat intel feeds, and setting up network scanning. Understand the benefits of Suite Security, auto-patching, and firewall integration. Get recommendations for cost-effective solutions using Raspberry Pi 3 and explore the potential of Security Onion for enhanced protection.

Syllabus

Introduction
Network Security Monitoring
Log Stash
Elastic Search Database
Logstash
Install Kabana
Log Stash Configuration File
Log Normalization
Custom Patterns
Normalization
Conditional Statements
GeoIP
Remove key fields
Date matching
Translate
Dictionary Hash
External Sources
Email Output Plugin
Email Alerts
Cabana Dashboard
Threat Intel Feed
GeoIP Map
Scripting
Environment Overview
Leonardo DiCaprio
Network Scanning
Suite Security
Recommendations
Email Alert
Service Safe
Auto patching
Cost
Raspberry Pi 3
Firewall Integration
Security Onion
Wrapup
Dots in rows logs
Have I had a chance to play with 22
Any other questions


Taught by

Security BSides San Francisco

Related Courses

Early Detection through Deception
YouTube
Hack for Show, Report for Dough - Brian King
YouTube
Blue Teamin on a Budget of Zero - Kyle Bubp
YouTube
Windows Event Logs - Zero to Hero
YouTube
Weaponizing Splunk - Using Blue Team Tools for Evil
YouTube