YoVDO

Using Hadoop for Malware, Network, Forensics and Log Analysis

Offered By: 44CON Information Security Conference via YouTube

Tags

44CON Courses Hadoop Courses Malware Analysis Courses Network Analysis Courses Log Analysis Courses Forensics Courses

Course Description

Overview

Learn how to leverage Hadoop for tackling massive data challenges in cybersecurity, including malware analysis, network forensics, and log processing. Explore the VirusShare malware collection, understand Hadoop components, and dive into practical applications using tools like BinaryPig and PacketPig. Discover techniques to efficiently handle overwhelming volumes of data, from analyzing hundreds of thousands of daily malware samples to processing network traffic at 10+ Gbps speeds and managing terabytes of log files. Gain insights into implementing these solutions and overcoming the "Too Much Data to Process" problem in information security.

Syllabus

Intro
VirusShare Malware Collection
VirusShare Latest Releases
Hadoop components
Malware Analysis - BinaryPig
Network Analysis - PacketPig
How does it work?
How do I do it?
Conclusions


Taught by

44CON Information Security Conference

Related Courses

Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Palo Alto Networks Cybersecurity Essentials II
Palo Alto Networks via Coursera
Introducción al Análisis del Malware en Windows
National Technological University – Buenos Aires Regional Faculty via Miríadax
Android Malware Analysis - From Zero to Hero
Udemy
How to Create and Embed Malware (2-in-1 Course)
Udemy