Scaling Your Defenses - Next Level Security Automation for Enterprise
Offered By: RSA Conference via YouTube
Course Description
Overview
Syllabus
Intro
Intro Questions
What do "Automations" Look like today?
How can I measure my organizations Automation Capabilities?
What can Automations look like, and where do we start?
Component One: Alert Ingestion
Component Two: Data Collection
Component Four: Alert Remediation
Component Five: Reporting
The Missing Component: Automated Alert Analysis (Component Three)
Reviewing the Manual Analysis Process for Indicator Scoring
Simple Scoring Use Case: Virustotal File/URL Reputation
Simple Scoring Summary
Implementing Heuristic Analysis
Detailed Scoring Use Case: VirusTotal Domain Reputation
Heuristic Scoring Summary
Uplifting from Heuristic Analysis to Machine Learning Models
Training the Machine Learning
Tuning the Automations
How to Calculate ROI
Real-World Automation Return on Investment
How do I implement this in my environment?
Taught by
RSA Conference
Related Courses
Master Mathematical Cryptography 2020: Crack Any CodeUdemy Cryptography from Scratch| Master Cryptography in Java
Udemy Information Security in Python
Udemy Cryptography
Caleb Curry via YouTube Linux for Programmers - Public-Private Key Authentication (RSA) and FTP
Tech with Tim via YouTube