Cybersecurity
Showing 1117–1128 of 1211 results
Threat Hunting with PySpark
In this demo, you'll learn how to perform advanced graph analytics on disparate windows log data to identify anomalies.
Threat Hunting with Yara
With the battle on cyber threats becoming an uphill battle for current security capabilities, Threat Hunting with Yara will uplift your skills for detecting and defending against modern threats.
Threat Hunting: Endpoint Hunting
Being responsible to go find the anomalies within an environment can be a daunting task. This course will teach you how to hunt through endpoint artifacts to find malicious behavior.
Threat Hunting: Hypothesize and Plan
Being responsible for finding malicious anomalies within an environment can be a daunting task. This course will teach you about different methodologies for threat hunting, and how to take action on indicators provided through threat intelligence.
Threat Hunting: Network Hunting
Being responsible to go find the anomalies within an environment can be a daunting task. This course will teach you how to hunt through network traffic to find malicious behavior.
Threat Hunting: Review, Automate, and Improve
What are the follow-on tasks after completing a threat hunt? This course will teach you how to generate tangible outcomes and improve your threat hunting process.
Threat Intelligence with MISP
In this course, you will learn how to implement open source threat intelligence sharing and analysis using MISP.
Threat Intelligence with MSTICPy
This course will focus on using MSTICPy in notebooks to detect adversary logons, decode obfuscated scripting attacks, and attempts to establish persistence.
Threat Modeling the Death Star
In this session, Mario Areias will introduce attack trees and how they can fit in a DevOps world. This talk will also challenge some of the assumptions about threat models.
Threat Modeling: The Big Picture
In this course, you'll be provided with a high-level overview of what threat modeling is, how it can be used, and potential challenges you may face when attempting to use threat modeling for your day to day activities, projects, or environments.
Threats, Vulnerabilities, and Mitigations for CompTIA Security+
This course will teach you the essential concepts necessary to assess, articulate, and mitigate threats and vulnerabilities within your company as well and prepare you for the Security+ exam.
Toolkit for Cybersecurity Professionals: Advanced Strategies for Businesses
This Free Online Course Includes: 3-4 Hours of Learning CPD Accreditation Final Assessment