Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Security Operations
Showing:
122
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
ServiceNow Vulnerability Response Training
1
rewiews
Learn to implement ServiceNow's Vulnerability Response app for tracking and remediating IT system vulnerabilities in organizations. Covers Security Operations Suite overview and VR modules.
Add to list
2
Lesons
30 minutes
On-Demand
Free-Video
secwestnet
Hunting the Adversary - Applying Cyber Threat Intelligence
1
rewiews
Learn techniques for applying cyber threat intelligence and hunting adversaries in digital environments with expert John Bambenek.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
Cloud Security Alliance
Cloud Security and Future Emerging Technologies - Practices for Effective Operational Governance
0
rewiews
Operationalize cloud security foundations and measure program effectiveness to align with risk appetite in expanding cloud environments.
Add to list
1
Lesons
38 minutes
On-Demand
Free-Video
Cloud Security Alliance
5 Ways Cybersecurity Leaders Can Leverage GenAI in 2024
0
rewiews
Discover how to leverage GenAI for enhanced cybersecurity, including team augmentation, anomaly detection, and accelerated insights, while maintaining data security and privacy.
Add to list
1
Lesons
24 minutes
On-Demand
Free-Video
CISSP Certification Exam Lectures
0
rewiews
Comprehensive preparation for the CISSP certification exam, covering all 8 domains of information security management and providing strategies for exam success.
Add to list
14
Lesons
17 hours
On-Demand
Free-Video
CISSP
0
rewiews
Comprehensive cybersecurity training covering risk management, asset security, engineering, networking, access management, and secure development. Prepares for CISSP certification and career advancement.
Add to list
67
Lesons
1 day 7 hours
On-Demand
Free-Video
CISSP
0
rewiews
Comprehensive guide to CISSP certification: exam preparation, key domains, testing strategies, and maintaining credentials for information security professionals.
Add to list
17
Lesons
30 minutes
On-Demand
Free-Video
CISSP
0
rewiews
Comprehensive overview of CISSP certification, covering 8 domains with focus on key concepts, exam preparation strategies, and practical security knowledge.
Add to list
50
Lesons
3 hours 30 minutes
On-Demand
Free-Video
CISSP Training for Cyber Security
0
rewiews
Comprehensive CISSP certification preparation covering key domains, security concepts, and exam strategies for aspiring cybersecurity professionals.
Add to list
13
Lesons
2 hours 30 minutes
On-Demand
Free-Video
Full CISSP Training Videos by Domain
0
rewiews
Comprehensive exploration of 8 essential domains in information systems security, covering risk management, asset protection, architecture, networking, access control, testing, operations, and software security.
Add to list
8
Lesons
3 hours 30 minutes
On-Demand
Free-Video
a16z
Software Secures the World
0
rewiews
Explore evolving security threats and strategies in the digital age, from medieval walls to AI-driven solutions. Learn how CEOs and CSOs can adapt to new challenges in cloud computing and complex systems.
Add to list
6
Lesons
20 minutes
On-Demand
Free-Video
USENIX Enigma Conference
Reservist Model - Distributed Approach to Scaling Incident Response
0
rewiews
Discover Netflix's innovative Reservist Program for scaling incident response without massive headcount. Learn to build an auxiliary Crisis Manager pool to handle sporadic surges in security incidents efficiently.
Add to list
1
Lesons
14 minutes
On-Demand
Free-Video
RSA Conference
Beyond the Curve - The Reintroduction of the Workforce
0
rewiews
Explore challenges and strategies for safely reintroducing employees to physical office settings, with insights on evolving security operations and workforce management post-pandemic.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
Microsoft
New Microsoft Security, Compliance, and Identity Certifications
0
rewiews
Discover Microsoft's new certifications in Security, Compliance, and Identity. Learn about training paths and certification options for security fundamentals, operations, identity access, and information protection.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
Microsoft
SIEM and XDR: Automating Threat Detection and Response
0
rewiews
Explore Microsoft's integrated SIEM+XDR solution for advanced threat detection and automated response, designed to protect environments end-to-end and stay ahead of sophisticated adversaries.
Add to list
1
Lesons
24 minutes
On-Demand
Free-Video
Microsoft
Threat Response with Microsoft Sentinel Playbooks - Learn Live
0
rewiews
Explore Microsoft Sentinel's SOAR capabilities and create automated playbooks for efficient security threat response. Hands-on session with live expert guidance and audience interaction.
Add to list
1
Lesons
57 minutes
On-Demand
Free-Video
Security Onion
Cybersecurity Trends and Challenges - Security Onion Conference 2023 Keynote
0
rewiews
Cybersecurity expert Dave Kennedy delivers insights on industry trends, national security, and the future of digital protection in this engaging keynote address.
Add to list
1
Lesons
58 minutes
On-Demand
Free-Video
Security Onion
Enrich Your Data and Your Life: Data Enrichment in Security Onion 2.4
0
rewiews
Explore data enrichment methods in Security Onion 2.4 to enhance cybersecurity events with threat intelligence and organizational context, improving overall security posture.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
Metrics That Suck Even Less
0
rewiews
Explore improved cybersecurity metrics for more effective risk assessment and decision-making in information security management.
Add to list
1
Lesons
57 minutes
On-Demand
Free-Video
Dragos: ICS Cybersecurity
Collection Management Framework for ICS Security Operations and Incident Response
0
rewiews
Extend asset inventory value with a Collection Management Framework for ICS security operations and incident response. Learn to gather requirements, plan, and implement use cases for efficient threat monitoring and response.
Add to list
18
Lesons
1 hour 3 minutes
On-Demand
Free-Video
OWASP Foundation
Serverless Security: Challenges and Opportunities
0
rewiews
Explore serverless architecture's impact on security operations with Twilio experts. Learn about challenges, benefits, and best practices in this emerging paradigm.
Add to list
1
Lesons
38 minutes
On-Demand
Free-Video
OWASP Foundation
Overcoming the Inundation of Noisy Security Alerts
0
rewiews
Learn strategies to manage and prioritize security alerts effectively, reducing noise and focusing on critical vulnerabilities in application security.
Add to list
1
Lesons
54 minutes
On-Demand
Free-Video
Security Onion
Security Onion 2 Release Announcement and Live Demo
0
rewiews
Discover the latest features and improvements in Security Onion 2 through an in-depth release announcement and live demonstration, showcasing advanced capabilities for network security monitoring and threat detection.
Add to list
1
Lesons
2 hours 25 minutes
On-Demand
Free-Video
Security Onion
Security Onion - Orchestrating into SO-OODA
0
rewiews
Explore orchestration techniques for enhancing Security Onion's capabilities, focusing on the SO-OODA framework to improve threat detection and response in network security environments.
Add to list
1
Lesons
50 minutes
On-Demand
Free-Video
Security Onion
Building Your Security Operations Use Case
0
rewiews
Learn to develop effective security operations use cases for enhanced threat detection and response in this insightful talk by industry expert Don Murdoch.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
Analyzing and Reverse Engineering Antivirus Signatures
0
rewiews
Explore antivirus signature analysis and reverse engineering, gaining insights into detection evasion techniques and evaluating Microsoft Defender's effectiveness for improved cybersecurity strategies.
Add to list
1
Lesons
1 hour 7 minutes
On-Demand
Free-Video
The Cyber Academy
Security Operations
0
rewiews
Comprehensive overview of cybersecurity operations, covering key concepts, strategies, and best practices for protecting digital assets and managing security incidents effectively.
Add to list
1
Lesons
29 minutes
On-Demand
Free-Video
Data Analytics and Metrics for the Win - Webinar 4
0
rewiews
Explore data analytics and metrics strategies for success with insights from Amélie Koran, enhancing decision-making and performance evaluation in cybersecurity.
Add to list
1
Lesons
1 hour 5 minutes
On-Demand
Free-Video
Okta
Cyber Threat Intelligence Demystified - Leveraging Intelligence for Effective Cybersecurity
0
rewiews
Explore cyber threat intelligence essentials, best practices, and automation tools to enhance your organization's cybersecurity strategy and proactively combat advanced threats.
Add to list
19
Lesons
46 minutes
On-Demand
Free-Video
LASCON
10 Pounds of Tacos in a 5-Pound Bag: Lessons Learned from Security Operations in a Dynamic Environment
0
rewiews
Insights on building security processes and teams in fast-paced, resource-constrained environments. Learn from an expert's experience in establishing a security presence during organizational transformation.
Add to list
1
Lesons
55 minutes
On-Demand
Free-Video
Black Hat
The Fault in Our Metrics - Rethinking How We Measure Detection and Response
0
rewiews
Rethinking cybersecurity metrics: Learn to develop meaningful measurements for detection and response capabilities, avoiding pitfalls of traditional metrics and motivating teams effectively.
Add to list
1
Lesons
41 minutes
On-Demand
Free-Video
Security BSides San Francisco
PirOps - What 18th-Century Piracy Can Teach Us About SecOps
0
rewiews
Explore historical pirate strategies and their surprising relevance to modern SecOps, drawing insights from 18th-century Caribbean piracy for today's security practices.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
DefCamp
Using RPA for Fast, Reliable and Repeatable Incident Response
0
rewiews
Explore how Robotic Process Automation enhances incident response in cybersecurity, offering speed, reliability, and repeatability for improved threat management and operational efficiency.
Add to list
1
Lesons
30 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
IAM Confused - Getting Work Done and Keeping SecOps Happy
0
rewiews
Explore effective IAM strategies to balance productivity and security in cloud environments, addressing common challenges and implementing best practices for access management.
Add to list
1
Lesons
41 minutes
On-Demand
Free-Video
RSA Conference
Security Automation Done Right - The Holy Grail of Modern Security Operations
0
rewiews
Experts discuss leveraging AI and data to optimize security operations, exploring automation's role in incident detection, remediation, and data inventory management amid evolving threats.
Add to list
1
Lesons
38 minutes
On-Demand
Free-Video
Microsoft
Unifying XDR and SIEM: A New Era in Security Operations
0
rewiews
Explore innovations in AI, attack disruption, threat intelligence, and cloud security to enhance threat detection and response, boosting productivity for security teams.
Add to list
1
Lesons
40 minutes
On-Demand
Free-Video
Microsoft
Making End-to-End Security Real - Implementing Integrated Microsoft Security Solutions
0
rewiews
Discover practical strategies for implementing comprehensive security across Microsoft products, focusing on quick wins and integrated solutions for identity and security operations.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
Security BSides London
Scaling Detection and Response Teams - Enabling Efficient Investigations
0
rewiews
Strategies for scaling detection and response teams to enhance investigation efficiency in cybersecurity operations, focusing on automation and process optimization.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
RSA Conference
Improving Collaboration and Reducing Risk in Security Operations - Part 2
0
rewiews
Explore strategies for enhancing IT-business collaboration and risk management in organizations of all sizes, with insights from security leaders on SOC challenges and solutions.
Add to list
1
Lesons
1 hour 30 minutes
On-Demand
Free-Video
NDC Conferences
Automating Security Monitoring
0
rewiews
Explore efficient security monitoring through automation techniques to handle increasing data volumes, complex architectures, and sophisticated threats while reducing alert fatigue.
Add to list
1
Lesons
50 minutes
On-Demand
Free-Video
INFOSEC TRAIN
Cyber Threat Hunting and DFIR - Understanding Malware Attack Steps
0
rewiews
Explore cyber threat hunting and DFIR techniques, including malware attack paths, detection methods, and essential skills for strengthening organizational cybersecurity defenses.
Add to list
15
Lesons
47 minutes
On-Demand
Free-Video
Security BSides San Francisco
Startup Security: From First Hire to Post-IPO - An Actionable Plan
0
rewiews
Actionable strategies for building and scaling security in startups, from initial hire to post-IPO, with practical advice for thriving as a small security team.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
Security BSides San Francisco
Reinventing ETL for Detection and Response Teams
0
rewiews
Explore innovative strategies for efficient, cost-effective data collection and log enrichment tailored to Detection and Response teams' unique requirements in cybersecurity.
Add to list
1
Lesons
29 minutes
On-Demand
Free-Video
BSidesLV
The Fault in Our Metrics - Rethinking How We Measure Detection and Response
0
rewiews
Rethinking cybersecurity metrics: A practical framework for developing effective detection & response measurements that incentivize progress and tell a compelling story to leadership.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
BSidesLV
PhishDefend - A Reinforcement Learning Framework for AI-Augmented Phishing Detection and Response
0
rewiews
Explore a reinforcement learning framework for measuring AI-augmented phishing detection and response, enhancing cybersecurity strategies against evolving threats.
Add to list
1
Lesons
52 minutes
On-Demand
Free-Video
Google Cloud Tech
A Blueprint for Modern Security Operations
0
rewiews
Discover a fresh approach to cybersecurity, combining reactive and proactive techniques with AI to effectively defend against sophisticated threats.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
BSides SATX
The Fault in Our Metrics: Rethinking How We Measure Detection and Response
0
rewiews
Rethink detection and response metrics with a practical framework, new maturity model, and visual examples. Learn to measure capabilities effectively and tell a compelling story using micro-purple testing techniques.
Add to list
1
Lesons
39 minutes
On-Demand
Free-Video
Google Cloud Tech
What's Next for Security Professionals - Innovations in Threat Prevention and AI-Driven Security
0
rewiews
Explore the convergence of security capabilities, AI-driven innovations, and insights from industry leaders to transform your organization's security approach.
Add to list
1
Lesons
50 minutes
On-Demand
Free-Video
HackMiami
Harnessing AI in Security Operations
0
rewiews
Explore AI's role in SOCs, addressing threat abstraction and correlation challenges. Enhance AI solution evaluation skills, separate hype from reality, and design AI-ready security operations.
Add to list
1
Lesons
57 minutes
On-Demand
Free-Video
Cloud Security Alliance
Unlocking Security Insights for Everyone with AI - Using Large Language Models
0
rewiews
Discover how AI and Large Language Models democratize cloud security by simplifying complex data analysis, enabling plain-language queries, and fostering better organizational collaboration.
Add to list
1
Lesons
14 minutes
On-Demand
Free-Video
Microsoft
Leverage Recorded Future Playbooks to Automatically Integrate Threat Intelligence with Microsoft Azure
0
rewiews
Automate threat intelligence integration in Microsoft Azure using Recorded Future Playbooks for enhanced detection, enrichment, and prevention in Sentinel and Defender ATP.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
OWASP Foundation
Detecting Credential Compromise in AWS
0
rewiews
Learn how to detect compromised AWS credentials without prior IP knowledge, crucial for preventing costly data breaches and infrastructure abuse in cloud environments.
Add to list
1
Lesons
48 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Reduce Security Alert Fatigue - Focus on What Matters
0
rewiews
Learn strategies to prioritize and manage security alerts effectively, minimizing fatigue and focusing on critical issues in cloud-native environments.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
Microsoft
Microsoft Defender: Stop Attacks and Reduce Security Operations Workload with XDR
0
rewiews
Comprehensive XDR solution preventing attacks, detecting threats, and automating security operations. Integrates Microsoft 365 Defender and Azure Defender for proactive threat hunting and customized detection tools.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Bypassing Falco - How to Compromise a Cluster without Tripping the SOC
0
rewiews
Explore techniques to bypass Falco's default ruleset, enabling stealthy cluster compromise. Learn 9 bypass classes for target enumeration, privilege escalation, and lateral movement without alerting security teams.
Add to list
1
Lesons
34 minutes
On-Demand
Free-Video
Introduction to PowerShell Scripting for Security - Hack3rcon 2014
0
rewiews
Learn essential PowerShell scripting techniques for enhancing cybersecurity, covering key concepts and practical applications to strengthen your defensive capabilities.
Add to list
1
Lesons
1 hour 58 minutes
On-Demand
Free-Video
BSidesLV
Open Source GitOps for Detection Engineering
0
rewiews
Explore an open-source GitOps framework for efficient detection engineering, enabling version control, collaboration, and automated deployment of security rules and policies.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
NorthSec
Full Circle Detection - From Hunting to Actionable Detection
0
rewiews
Comprehensive guide to creating efficient detection rules, from initial hunting ideas to actionable alerts for security analysts, using a real-world example of an Outlook persistence technique.
Add to list
11
Lesons
23 minutes
On-Demand
Free-Video
DefCamp
Beyond Security Operations
0
rewiews
Explore advanced security operations strategies with ExpressVPN's SOC Manager. Learn cutting-edge techniques to enhance cybersecurity measures and stay ahead of evolving threats in this insightful DefCamp 2022 presentation.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
WEareTROOPERS
You Disliked Mimikatz? Wait for Kekeo
0
rewiews
Explore advanced Windows authentication exploitation techniques and tools, focusing on the powerful kekeo utility for penetration testing and security analysis.
Add to list
1
Lesons
1 hour
On-Demand
Free-Video
RSA Conference
Security Learns to Sprint - DevSecOps
0
rewiews
Explore how DevOps can revolutionize application security by integrating it into daily development and operations workflows, enabling faster and more secure software delivery.
Add to list
1
Lesons
51 minutes
On-Demand
Free-Video
RSA Conference
Why the Role of CISO Sucks and What We Should Do to Fix It
0
rewiews
Explore challenges faced by CISOs, including stress, career risks, and organizational resistance. Learn strategies to thrive in this evolving role and enhance cybersecurity leadership effectiveness.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
Security BSides San Francisco
Look Ma, No Hands! - Decentralizing Security for Scale
0
rewiews
Explore decentralizing security operations for scalability, empowering developers with tools and practices to integrate security seamlessly into their workflow.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
RSA Conference
Cybersecurity Tips, Tools and Techniques for Your Professional Toolbag
0
rewiews
Rapid-fire showcase of cybersecurity apps, tools, and advanced techniques for testing, investigations, and administration. Optimize open-source tools for Windows and Linux to enhance your security program.
Add to list
1
Lesons
41 minutes
On-Demand
Free-Video
WEareTROOPERS
Granular Trust - Making It Work
0
rewiews
Explore granular trust models for enhanced security, covering authentication, access levels, and emergency protocols. Learn to implement flexible, context-aware security systems.
Add to list
35
Lesons
57 minutes
On-Demand
Free-Video
Microsoft
Intelligence Led Security Operations in Microsoft Azure Sentinel
0
rewiews
Integrate Recorded Future with Azure Sentinel to quickly identify, prioritize, and action threats using external threat intelligence, maximizing existing security investments.
Add to list
12
Lesons
26 minutes
On-Demand
Free-Video
RSA Conference
Unraveling the Recipe for Resilient Enterprise Security Operations
0
rewiews
Explore strategies for resilient enterprise security operations, focusing on informed decision-making during critical incidents like ransomware attacks. Learn about risk indicators and active defense techniques.
Add to list
11
Lesons
47 minutes
On-Demand
Free-Video
Black Hat
Incident Response
0
rewiews
Explore incident response and threat intelligence with Palo Alto Networks' SVP Wendi Whitmore, discussing cybersecurity consulting, ransomware trends, and prevention strategies.
Add to list
6
Lesons
15 minutes
On-Demand
Free-Video
RSA Conference
Your Metrics Suck - 5 SecOps Metrics That Are Better Than MTTR
0
rewiews
Explore effective SecOps metrics beyond MTTR, focusing on business confidence, driving change, and improving SOC performance. Learn about configuration, analyst activity, and process deviation.
Add to list
10
Lesons
40 minutes
On-Demand
Free-Video
RSA Conference
The Network Is Going Dark - Why Decryption Matters for SecOps
0
rewiews
Explore strategies for decrypting encrypted network traffic, focusing on TLS 1.3 challenges and solutions like SSL fingerprinting and session-key forwarding for effective network security operations.
Add to list
28
Lesons
53 minutes
On-Demand
Free-Video
RSA Conference
5G Trust Model - Recommendations and Best Practices for CSPs
0
rewiews
Explore 5G security paradigms, best practices, and recommendations for CSPs. Learn about new approaches, AI utilization, integration, orchestration, and automation in 5G security.
Add to list
21
Lesons
42 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
Embracing the Uncertainty of Attacks with Big Data Analytics
0
rewiews
Exploring big data analytics to combat advanced cyber threats, reduce uncertainty, and transform security programs through intelligence-driven detection approaches and innovative strategies.
Add to list
19
Lesons
1 hour 5 minutes
On-Demand
Free-Video
Security BSides San Francisco
Back to the SOCless Future
0
rewiews
Explore Twilio's journey towards automated security operations, featuring insights on scalable 24/7 monitoring and a serverless automation framework for effective threat response.
Add to list
26
Lesons
32 minutes
On-Demand
Free-Video
Black Hat
Experimenting with Real-Time Event Feeds
0
rewiews
Explore innovative approaches to real-time event feeds in cybersecurity, challenging traditional SIEM methods and addressing high-volume data management for improved threat detection.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
0xdade
Adversary Detection Pipelines - Finally Making Your Threat Intel Useful
0
rewiews
Learn to extract value from threat intelligence by implementing Adversary Detection Pipelines. Explore attribution challenges, leverage TTPs, and enhance security operations through practical case studies and intelligence-driven strategies.
Add to list
1
Lesons
52 minutes
On-Demand
Free-Video
Security BSides San Francisco
Lessons Learned While Building a Privacy Operations Center at Headspace Health
0
rewiews
Insights on creating a Privacy Operations Center in digital healthcare, addressing global regulations and overcoming challenges in data protection and compliance.
Add to list
1
Lesons
40 minutes
On-Demand
Free-Video
TEDx
Teamwork and Security in Our Integrated Society
0
rewiews
Explore the interdependence of security and societal attitudes with a retired FBI agent. Learn how teamwork can combat isolation and enhance safety in our integrated world.
Add to list
1
Lesons
16 minutes
On-Demand
Free-Video
Security Onion
Security Onion Cases - Introduction to Case Management Interface
0
rewiews
Explore the new case management interface in Security Onion 2.3.100, enhancing investigation workflows and guiding future analyses with integrated platform features.
Add to list
1
Lesons
19 minutes
On-Demand
Free-Video
Security Onion
SOARing with Security Onion
0
rewiews
Explore how Security Onion integrates with automation tools for enhanced incident response, enabling faster threat detection and improved security operations efficiency.
Add to list
1
Lesons
30 minutes
On-Demand
Free-Video
Security Onion
Constructing Your Playbook within Security Onion
0
rewiews
Learn to build an effective security playbook using Security Onion, covering integration, shared resources, detections, templates, and Elastic Search for enhanced threat response.
Add to list
9
Lesons
25 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
Blue Team Visibility
0
rewiews
Explore strategies for enhancing blue team threat detection capabilities, leveraging multiple data sources to stay ahead of sophisticated attackers in an ever-evolving cybersecurity landscape.
Add to list
1
Lesons
29 minutes
On-Demand
Free-Video
LASCON
Empathy and Vulnerability in SecOps
0
rewiews
Explore how empathy and vulnerability enhance SecOps, improving team collaboration, incident response, and security awareness programs for more effective and resilient operations.
Add to list
1
Lesons
38 minutes
On-Demand
Free-Video
Black Hat
Incident Response at Scale - Building a Next Generation SOC
0
rewiews
Explore strategies for automating incident response processes in large-scale environments to improve efficiency, visibility, and organizational protection.
Add to list
1
Lesons
17 minutes
On-Demand
Free-Video
Black Hat
Adversary Detection Pipelines - Finally Making Your Threat Intel Useful
0
rewiews
Learn to maximize your threat intelligence program's value, enhancing security across teams with practical strategies for effective adversary detection and intel utilization.
Add to list
1
Lesons
38 minutes
On-Demand
Free-Video
Security BSides San Francisco
How SecOps Can Convince DevOps To Believe In The Bogeyman
0
rewiews
Discover strategies for bridging the gap between security and development teams, fostering a collaborative approach to cybersecurity in organizations.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
Measuring the Maturity of Your Security Operations Capabilities
0
rewiews
Explore security operations maturity, effectiveness measurement, and improvement strategies for enhanced cybersecurity capabilities and organizational resilience.
Add to list
14
Lesons
40 minutes
On-Demand
Free-Video
Departmentalizing Your SecOps
0
rewiews
Explore strategies for optimizing SecOps through departmentalization, enhancing communication, and leveraging opportunities across IT, monitoring, and security teams.
Add to list
15
Lesons
44 minutes
On-Demand
Free-Video
More Technology More People No Process
0
rewiews
Explore security operations, red team exercises, and core concepts in threat intelligence, with insights on metrics, automation, and quality in InfoSec.
Add to list
13
Lesons
48 minutes
On-Demand
Free-Video
Alignment of Business and IT Security
0
rewiews
Explore strategies for aligning business and IT security in the evolving threat landscape. Learn about visibility, analytics, and operational roles for effective threat detection and response.
Add to list
17
Lesons
45 minutes
On-Demand
Free-Video
Automating Security Operations on a Budget
0
rewiews
Learn cost-effective techniques for automating security operations, enhancing efficiency and effectiveness in protecting digital assets without breaking the bank.
Add to list
1
Lesons
3 hours 28 minutes
On-Demand
Free-Video
Offensive and Defensive Security with Ansible
0
rewiews
Learn to leverage Ansible for both offensive and defensive security operations, enhancing your cybersecurity toolkit with automation and efficiency.
Add to list
1
Lesons
40 minutes
On-Demand
Free-Video
Breaking NBAD & UEBA Detection
0
rewiews
Explore techniques to bypass Network Behavior Anomaly Detection (NBAD) and User Entity Behavior Analytics (UEBA), covering data poisoning, exfiltration, and various attack methods with live demonstrations.
Add to list
23
Lesons
34 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Collection is not Detection - Sec Ops in a Cloud Native Environment
0
rewiews
Optimizing cloud-native security operations: Strategies for efficient log collection, modern tooling, and rapid response in transitioning from on-premises to cloud environments.
Add to list
25
Lesons
31 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Noise Cancelling Headphones for Fluent Bit - Powered by Lua
0
rewiews
Explore Fluent Bit's Lua filter plugin for IP address enrichment and noise reduction in log data, enhancing security and data engineering workflows.
Add to list
13
Lesons
26 minutes
On-Demand
Free-Video
Cloud Security Alliance
How to Scale Security without Sacrificing Safety
0
rewiews
Discover effective strategies for scaling security operations while maintaining robust safety measures and protection protocols in cloud environments.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
Tech Field Day
Automated Security Incident Response with Swimlane - Building Effective Response Systems
0
rewiews
Discover how to build automated security response systems that reduce breach impact, minimize human error, and combat team fatigue in round-the-clock security operations management.
Add to list
1
Lesons
16 minutes
On-Demand
Free-Video
Tech Field Day
AI-Driven Operations for Proactive Decision-Making with FortiSOAR
0
rewiews
Discover how FortiSOAR's AI-powered Security Assistant enhances threat response, automates complex security tasks, and enables faster decision-making through GenAI capabilities and intelligent playbook development.
Add to list
1
Lesons
18 minutes
On-Demand
Free-Video
BSidesMunich
Better Breach Detection With Deception Inception - Using Honeypots
0
rewiews
Discover advanced breach detection techniques through deceptive honeypot strategies and learn how to implement effective security measures for enhanced threat identification.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
SK AI SUMMIT 2024
EDR 솔루션 기반 Managed Detection and Response 서비스 소개
0
rewiews
Discover how MDR services enhance security threat detection and response through EDR solutions, featuring implementation cases and expert insights for efficient security management.
Add to list
1
Lesons
20 minutes
On-Demand
Free-Video
Data Science Conference
Improving Cybersecurity Posture with an AI Security Assistant
0
rewiews
Discover how AI security assistants leverage MITRE ATT&CK knowledge base and LangChain framework to enhance cybersecurity through advanced threat detection, mapping, and rapid response capabilities.
Add to list
1
Lesons
26 minutes
On-Demand
Free-Video
load more...