
Windows logging, Sysmon, and ELK
In this video, the speakers discuss the powerful capabilities of the ELK stack (Elasticsearch, Logstash, and Kibana) for handling and analyzing Sysmon logs to improve cybersecurity measures.
In this video, the speakers discuss the powerful capabilities of the ELK stack (Elasticsearch, Logstash, and Kibana) for handling and analyzing Sysmon logs to improve cybersecurity measures.
In this video, the speaker discusses their journey and insights into the field of computer security, emphasizing the importance of foundational knowledge and hands-on experience. They detail their career progression, from initial roles in technical support to specialized positions in security, highlighting key learning moments and decisions.
In this video, the speakers discuss the effectiveness and accessibility of free and open-source Endpoint Detection and Response (EDR) tools. They explore the recent developments in the space, highlighting how these tools are now more accessible to smaller organizations due to their cost-effectiveness.
In this video, John and Bill discuss setting up and utilizing a home lab for security testing and experimentation. They cover the importance of a controlled environment for safely running malicious software and testing security tools, illustrating how to configure network isolation and capturing traffic for analysis.
In this video, the speaker discusses the intricacies and benefits of setting up and using home labs for network security and testing. They delve into the hardware and software components necessary for building a functional home lab, emphasizing the importance of customization to meet specific learning and testing needs.
🔗 Lab Resources https://github.com/strandjs/IntroLabs/blob/master/IntroClassFiles/navigation.md 🔗 VM Download Instructions https://www.antisyphontraining.com/john-strand-training-lab-download-instructions/ 🔗 Pay What You Can (PWYC) Training Schedule https://www.antisyphontraining.com/pay-what-you-can/ This 16-hour (4-days, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots …
In this video, John and Rob discuss various network monitoring and security tools, highlighting their functionalities and applications in cybersecurity. They demonstrate the use of tools like Rita and LogRhythm’s Network Monitor, explaining how these tools can be used for traffic analysis, threat detection, and incident response.
In this video, John Strand discusses the concept of beaconing using the tool Rita from the Active Defense Harbinger Distribution (ADHD). He explains how to use Rita to analyze packet captures for beaconing patterns, leveraging its capabilities to parse and analyze network data.
/// 🔗 Register for webcasts, summits, and workshops – https://blackhillsinfosec.zoom.us/ze/hub/stadium 🛝 Webcast Slides – https://www.antisyphontraining.com/wp-content/uploads/2024/06/2024_06_05_anticast_How-to-Forge-Fake-News-and-Spawn-Flawless-Phisheries_Michael-Allen.pdf Anyone (and we mean anyone) can create perfect forgeries of trusted websites and use them to spread misinformation, conduct phishing attacks, or worse. In this webcast we explore the topic …
/// 📄 View our Pay-What-You-Can Courses https://www.antisyphontraining.com/pay-what-you-can/ /// 📄 View the Antisyphon Course Catalog https://www.antisyphontraining.com/course-catalog/ /// 📄 View Our Live Training Course Calendar https://www.antisyphontraining.com/training-calendar/ /// 📄 Antisyphon Training Roadmap https://www.antisyphontraining.com/training-roadmap/ ///Antisyphon Socials Twitter: https://twitter.com/Antisy_Training Mastodon: https://infosec.exchange/@Antisy_Training LinkedIn: https://www.linkedin.com/company/antisyphon-training Discord: https://discord.gg/ffzdt3WUDe ///Antisyphon Training Pay What …