Security Monitoring - Avoiding Oh Sh*t Moments
Offered By: Security BSides London via YouTube
Course Description
Overview
Discover effective strategies for security monitoring and learn how to prevent critical breaches in this insightful conference talk from Security BSides London. Explore the challenges of alert fatigue and the importance of identifying intrusions promptly. Gain valuable insights into threat modeling processes, including enumeration and modeling techniques. Understand the pitfalls of the "rockstar mentality" in cybersecurity and learn practical approaches to improve your organization's security posture. Delve into concepts like the "secret sock" and "budget sock" to enhance your understanding of resource allocation in security monitoring.
Syllabus
Introduction
Security breaches
Alert fatigue
Identify the intrusion
Rockstar mentality
The secret sock
The budget sock
Threat modeling
Threat modeling process
Modeling
Enumeration
Modelling
Taught by
Security BSides London
Related Courses
程序设计实习 / Practice on ProgrammingPeking University via Coursera 算法基础
Peking University via Coursera 算法基础 | Fundamental Algorithms
Peking University via edX 算法基础
Peking University via Coursera Complete Cyber Security Course: Go From Zero To Hero
Udemy