Detection as Code - Detection Development Using CI/CD
Offered By: RSA Conference via YouTube
Course Description
Overview
Explore a modern approach to detection engineering using CI/CD in this 30-minute RSA Conference talk. Learn how to automate detection rule testing with Attack Range, an open-source tool for simulating adversary attacks in lab environments. Discover the CI/CD workflow for detection engineering, including commit detection schemas, branching workflows, and detection conversion and packaging. Dive into Mordor Labs, Attack Range architecture, and commands. Understand how to notify test outcomes and deploy detections effectively. Apply these cutting-edge techniques to enhance your organization's security posture through streamlined detection development processes.
Syllabus
Intro
CI/CD Workflow - Detection Engineering
Commit detection - detection schema
Commit detection - Branching workflow
Convert Detection & Package Detection
Test Detections
Mordor Labs
Attack Range Architecture
Attack Range Commands
Notify of test outcome
Deploy detections
Apply What You Have Learned Today
Taught by
RSA Conference
Related Courses
Master Mathematical Cryptography 2020: Crack Any CodeUdemy Cryptography from Scratch| Master Cryptography in Java
Udemy Information Security in Python
Udemy Cryptography
Caleb Curry via YouTube Linux for Programmers - Public-Private Key Authentication (RSA) and FTP
Tech with Tim via YouTube