YoVDO

Using Security Onion to See Adversary Activity through All Phases of the Kill Chain

Offered By: Security Onion via YouTube

Tags

Security Onion Courses Network Security Courses Incident Response Courses Intrusion Detection Courses Threat Detection Courses Cyber Kill Chain Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive conference talk that delves into leveraging Security Onion to detect and analyze adversary activities across all stages of the cyber kill chain. Learn from experts Benjamin Klimkowski and Sean Eyre as they demonstrate how to effectively utilize this powerful open-source security platform to enhance threat detection capabilities. Gain valuable insights into peeling back the layers of complex cyber attacks and understanding attacker methodologies throughout the entire attack lifecycle. Discover practical techniques and strategies for implementing Security Onion to improve your organization's overall security posture and incident response readiness.

Syllabus

Security Onion Conference 2019: Using SO to See Adversary Activity through All Phases of Kill Chain


Taught by

Security Onion

Related Courses

Network Security Monitoring (NSM) with Security Onion
Pluralsight
Network Security Analysis Using Wireshark, Snort, and SO
Udemy
Extensions, Frameworks, & Integrations Used with Zeek
Pluralsight
Security Onion
Cybrary
Enterprise Security Monitoring - Seeing Clearly with Security Onion - Wes Lambert
YouTube