YoVDO

Using Security Onion to See Adversary Activity through All Phases of the Kill Chain

Offered By: Security Onion via YouTube

Tags

Security Onion Courses Network Security Courses Incident Response Courses Intrusion Detection Courses Threat Detection Courses Cyber Kill Chain Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive conference talk that delves into leveraging Security Onion to detect and analyze adversary activities across all stages of the cyber kill chain. Learn from experts Benjamin Klimkowski and Sean Eyre as they demonstrate how to effectively utilize this powerful open-source security platform to enhance threat detection capabilities. Gain valuable insights into peeling back the layers of complex cyber attacks and understanding attacker methodologies throughout the entire attack lifecycle. Discover practical techniques and strategies for implementing Security Onion to improve your organization's overall security posture and incident response readiness.

Syllabus

Security Onion Conference 2019: Using SO to See Adversary Activity through All Phases of Kill Chain


Taught by

Security Onion

Related Courses

Network Security
Rochester Institute of Technology via edX
Network Security
Georgia Institute of Technology via Udacity
Real-Time Cyber Threat Detection and Mitigation
New York University (NYU) via Coursera
Information security - IV
Indian Institute of Technology Madras via Swayam
Cyber Security
CEC via Swayam