Understanding Sigma Signature Language For Threat Detection | TryHackMe

  Рет қаралды 6,530

Motasem Hamdan | Cyber Security & Tech

Motasem Hamdan | Cyber Security & Tech

Күн бұрын

Пікірлер: 10
@Maccanarchy
@Maccanarchy 7 ай бұрын
Great videos man, you're walk throughs are incredible and I definitely owe you for getting me through the SOC Analyst Level 1. Looking forward to getting through level two now.
@someone2324
@someone2324 5 ай бұрын
you are a great teacher! thank you!
@admar-nelson
@admar-nelson Жыл бұрын
Hi Motasem, Great to get your lessons. I would like to be more clear in sigma. what i need?
@imveryhungry112
@imveryhungry112 11 ай бұрын
So is there any way to generate sql queries from these signatures now? Or did they get rid of that feature because it was too simple and too logical?
@pritamdatta6692
@pritamdatta6692 2 жыл бұрын
Hey, can you please make a video on "Lateral Movement and Pivoting" from Red Team Training?
@bella_ame
@bella_ame Жыл бұрын
Thanks for the video..
@emreislamalmal4256
@emreislamalmal4256 Ай бұрын
Where is task 1 2 3 4?
@Baile_an_Locha
@Baile_an_Locha Жыл бұрын
Good until you showed the example…text way too small to read.
@imveryhungry112
@imveryhungry112 11 ай бұрын
This framework is total bs. IT IS NOT AGNOSTIC. It requires VERY SPECIFIC siem frameworks to build queries from the signatures.
@johnvardy9559
@johnvardy9559 Жыл бұрын
σ that's Greek letter 👏
The Cyber Kill Chain Explained | Threat Intelligence | TryHackMe
28:42
Motasem Hamdan | Cyber Security & Tech
Рет қаралды 7 М.
Detecting Cyber Security Threats with Sigma Rules | TryHackMe SigHunt
29:16
Motasem Hamdan | Cyber Security & Tech
Рет қаралды 3,1 М.
How to Level Up Your SOC Analyst Skill with Power Tool: Sigma
35:37
Gerald Auger, PhD - Simply Cyber
Рет қаралды 13 М.
Splunk Search Processing Language | TryHackMe Splunk: Exploring SPL
41:02
Motasem Hamdan | Cyber Security & Tech
Рет қаралды 1,2 М.
Quick recap on the state of language model reasoning
16:22
Interconnects AI
Рет қаралды 2,7 М.
Detect Hackers & Malware on your Computer (literally for free)
16:38
How to Use Logs, Alerts, and Behavior to Detect APTs & TTPs
1:30:37
Immersive Labs
Рет қаралды 7 М.
SIEM Rule Creation Made Easy! Praeco/Elastalert and SIGMA
24:42
Taylor Walton
Рет қаралды 11 М.
Hunting for Hackers with Sigma Rules
26:47
John Hammond
Рет қаралды 20 М.
Generative AI is a Parasitic Cancer
1:19:55
Freya Holmér
Рет қаралды 279 М.
VPN Logs Investigation and Data Analytics With Elastic Stack | TryHackMe | Cyber Security
35:59
Motasem Hamdan | Cyber Security & Tech
Рет қаралды 4,8 М.
Transformers (how LLMs work) explained visually | DL5
27:14
3Blue1Brown
Рет қаралды 4,3 МЛН