Section 3.zip
838.9 MB
1 - Endpoint attack tactics
2 - Endpoint Defense in Depth
3 - How windows logging works
4 - How linux logging works
5 - Interpreting important events
6 - Log collection, parsing and normalization
7 - File contents and identification
8 - Identifying and handling suspicious files
9 - Summary
2 - Endpoint Defense in Depth
3 - How windows logging works
4 - How linux logging works
5 - Interpreting important events
6 - Log collection, parsing and normalization
7 - File contents and identification
8 - Identifying and handling suspicious files
9 - Summary
Section 4.zip
564.1 MB
1 - Alert triage and prioritization
2 - Perception memory and investigation
3 - Modules and concepts for infosec
4 - Structured analyticsal techniques
5 - Analysis questions and tactics
6 - Analysis opsec
7 - Intrusion discovery
2 - Perception memory and investigation
3 - Modules and concepts for infosec
4 - Structured analyticsal techniques
5 - Analysis questions and tactics
6 - Analysis opsec
7 - Intrusion discovery
Section 5.zip
628.8 MB
1 - Improving life in the SOC
2 - Analytic features and enrichment
3 - New analytic design, testing and sharing
4 - Tuning and false positive reduction
5 - Automation and orchestration
6 - Improving operational efficiency and workflow
7 - Containing identified instrusions
8 - Skill and career development
2 - Analytic features and enrichment
3 - New analytic design, testing and sharing
4 - Tuning and false positive reduction
5 - Automation and orchestration
6 - Improving operational efficiency and workflow
7 - Containing identified instrusions
8 - Skill and career development
🔥2
SEC 505.1 (2020) - Securing Windows and powershell automation pt.1
#sans #powershell #course #pentest
#sans #powershell #course #pentest