YoVDO

Using Hadoop for Malware, Network, Forensics and Log Analysis

Offered By: 44CON Information Security Conference via YouTube

Tags

44CON Courses Hadoop Courses Malware Analysis Courses Network Analysis Courses Log Analysis Courses Forensics Courses

Course Description

Overview

Learn how to leverage Hadoop for tackling massive data challenges in cybersecurity, including malware analysis, network forensics, and log processing. Explore the VirusShare malware collection, understand Hadoop components, and dive into practical applications using tools like BinaryPig and PacketPig. Discover techniques to efficiently handle overwhelming volumes of data, from analyzing hundreds of thousands of daily malware samples to processing network traffic at 10+ Gbps speeds and managing terabytes of log files. Gain insights into implementing these solutions and overcoming the "Too Much Data to Process" problem in information security.

Syllabus

Intro
VirusShare Malware Collection
VirusShare Latest Releases
Hadoop components
Malware Analysis - BinaryPig
Network Analysis - PacketPig
How does it work?
How do I do it?
Conclusions


Taught by

44CON Information Security Conference

Related Courses

Cybersecurity Fundamentals
Rochester Institute of Technology via edX
Cyber Security in Manufacturing
University at Buffalo via Coursera
Cybersecurity
Rochester Institute of Technology via edX
Cyber Incident Response
Infosec via Coursera
SSCP Cert Prep: 4 Incident Response and Recovery
LinkedIn Learning