Главная
Study mode:
on
1
Introduction
2
Disclaimer
3
Threat Intel
4
Why Threat Intel
5
PlanDoCheckAct
6
Ideas
7
Splunk
8
Splunk Setup
9
Plonk
10
Splunk Forward
11
Splunk Index
12
Splunk Search
13
Scheduled Search
14
Schedule Search
15
Splunk Dashboard
16
Dashboards
17
Conclusion
Description:
Explore the world of DIY threat intelligence in this DefCamp 2016 conference talk. Dive into the importance of threat intel and learn how to implement it effectively using the Plan-Do-Check-Act methodology. Discover practical ideas for setting up and utilizing Splunk, including installation, forwarding, indexing, and searching techniques. Master the creation of scheduled searches and dynamic dashboards to enhance your threat intelligence capabilities. Gain valuable insights into improving your organization's cybersecurity posture through hands-on threat intelligence practices.

Threat Intelligence! DIY! - DefCamp - 2016

DefCamp
Add to list
0:00 / 0:00