YoVDO

Using Security Onion to See Adversary Activity through All Phases of the Kill Chain

Offered By: Security Onion via YouTube

Tags

Security Onion Courses Network Security Courses Incident Response Courses Intrusion Detection Courses Threat Detection Courses Cyber Kill Chain Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive conference talk that delves into leveraging Security Onion to detect and analyze adversary activities across all stages of the cyber kill chain. Learn from experts Benjamin Klimkowski and Sean Eyre as they demonstrate how to effectively utilize this powerful open-source security platform to enhance threat detection capabilities. Gain valuable insights into peeling back the layers of complex cyber attacks and understanding attacker methodologies throughout the entire attack lifecycle. Discover practical techniques and strategies for implementing Security Onion to improve your organization's overall security posture and incident response readiness.

Syllabus

Security Onion Conference 2019: Using SO to See Adversary Activity through All Phases of Kill Chain


Taught by

Security Onion

Related Courses

Cybersecurity Foundations
LinkedIn Learning
Ethical Hacking with JavaScript
LinkedIn Learning
Ethical Hacking: Introduction to Ethical Hacking
LinkedIn Learning
Cyber Security, Tools, Techniques and Counter Measures
IGNOU via Swayam
Expert Malware Analysis and Reverse Engineering
Udemy