Главная
Study mode:
on
1
Introduction
2
Pivoting
3
Practice vs Performance
4
Secret Practice
5
Higher Quality Practice
6
Metacognition
7
Investigative Process
8
Evidence
9
Example
10
Data Transformation
11
Pivot
12
Pivot Practice
13
Pivot Examples
14
ID SLR Example
15
Suspicious File
16
Executing Write Mask
17
Scoping
18
Cobie
19
Learning to Pivot
20
Expert Pivots
21
Applying Pivoting
22
Why Pivoting
23
Pivots
24
Maturity
25
Data Source Wiki
26
Query History
27
Data Source
28
Pivot Map Demo
29
Final Thoughts
30
Wrap Up
Description:
Explore effective pivoting techniques to enhance threat detection in this 51-minute conference talk from Security Onion Conference 2017. Delve into Chris Sanders' expertise as he discusses the contrast between practice and performance, introduces the concept of secret practice, and emphasizes the importance of higher quality practice and metacognition in cybersecurity. Learn about the investigative process, evidence handling, and data transformation through practical examples. Discover various pivot techniques, including ID SLR and suspicious file analysis, and understand how to execute write masks and scope investigations effectively. Gain insights into expert pivoting strategies, the maturity of pivoting skills, and the significance of maintaining a data source wiki and query history. Witness a pivot map demo and gather final thoughts on applying pivoting techniques to catch more cybercriminals.

Security Onion 2017 - Pivoting Effectively to Catch More Bad Guys

Security Onion
Add to list