YoVDO

ATT&CKing Your Adversaries - Operationalizing Cyber Intelligence in Your Own Environment for Better Sleep and a Safer Tomorrow

Offered By: BSidesLV via YouTube

Tags

Security BSides Courses Event Management Courses Cyber Threat Intelligence Courses

Course Description

Overview

Explore a comprehensive conference talk on operationalizing cyber intelligence to enhance security and improve threat detection. Learn about the fundamentals of cyber threat intelligence, techniques for building effective detections, and the importance of command-line arguments. Discover methods to enable veracity in your security operations, leverage Splunk for enhanced monitoring, and understand event changes. Gain insights into the Caldera framework and its applications in cybersecurity. Conclude with a summary of key takeaways and access contact information for further inquiries.

Syllabus

Introduction
What is cyber threat intelligence
Building detections
Commandline arguments
Enable veracity
Spunk
Event Changes
caldera
Summary
Contact Information


Taught by

BSidesLV

Related Courses

Cyber Threat Intelligence
IBM via Coursera
Operationalizing Cyber Threat Intel: Pivoting & Hunting
Pluralsight
Ethical Hacking: Introduction to Ethical Hacking
LinkedIn Learning
The Future of Network Security and Defence
Coventry University via FutureLearn
Data Collection and Processing (CTIA Prep)
Pluralsight