YoVDO

What The Log - So Many Events, So Little Time

Offered By: Cooper via YouTube

Tags

Conference Talks Courses Cybersecurity Courses Security Compliance Courses

Course Description

Overview

Dive into the world of event logging and cybersecurity with this 42-minute conference talk by Miriam Wiesner. Explore techniques for detecting adversaries, understand the importance of identifying the weakest link in your security infrastructure, and learn about the Microsoft Security Compliance Toolkit. Discover the power of Audit Policy and Event List tools, gain insights into the MITRE ATT&CK framework, and address common pain points in cybersecurity. Get hands-on guidance on installing and using EventList, and explore the benefits of Sigma for threat detection. Enhance your ability to manage and analyze vast amounts of event data effectively in the face of ever-evolving security challenges.

Syllabus

Introduction
Disclaimer
Detecting adversaries
The weakest link
Microsoft Security Compliance Toolkit
Audit Policy
Customer Request
Event List
What is Mitre Attack
What are your pain points
How to install EventList
How to use EventList
Sigma
Conclusion


Taught by

Cooper

Related Courses

Introduction to Cybersecurity
SecurityScoreCard via Udacity
IBM Cybersecurity Fundamentals
IBM via edX
Preparing to Manage Security and Privacy Risk with NIST's Risk Management Framework
Pluralsight
Configuring Microsoft Azure Active Directory Privileged Identity Management
Pluralsight
Office 365: Plan for Exchange Online and Skype for Business Online (Office 365/Microsoft 365)
LinkedIn Learning