SIEM Correlation Rules for Beginners

  Рет қаралды 6,370

Prabh Nair

Prabh Nair

8 ай бұрын

If you're new to the world of data correlation and want to learn the basics, then this video is for you! I'll be discussing correlation rules in SIEM and explaining what they are and how you can use them to find insights in your data. SIEM correlation rules are essential for detecting security threats and incidents in your organization. By correlating events from different sources, you can identify patterns and anomalies that would be difficult to spot otherwise.
In this video, you'll learn how to develop effective SIEM correlation rules. We'll cover the basics of event correlation, as well as some more advanced techniques. You'll also learn some best practices for developing and managing SIEM correlation rules.
Ransomware Series
• Ransomware Series
SOC Interview Questions
• SOC Analyst Introducti...
Playlist Network Security
• Network Security
GRC Interview Questions
• Mock Job Interview Int...
Internal Auditor Playlist
• Internal Audit
How to make career progression post #isc2 and #isaca
• How to Make a Career P...
How to make career in GRC
• Learn How to Make an A...
How to Build PIMS
• How to Implement Priva...
How to Implement 27001 in an organization
• Implementing ISO 27001...
How to conduct PIA
• How to Conduct Privacy...
How to Make a career in GRC
• Learn How to Make an A...
Telegram Group
t.me/Prabhstudy
Start your career in cybersecurity with free resources .
Cybersecurity Career: How to Make a Career in Cybersecurity 2022 lnkd.in/gCGBnRM7
Pentesting Career
lnkd.in/gQYenKYd
Telegram Group Link
t.me/Prabhstudy
Cybersecurity Guide
• Cybersecurity Guide
Follow me on Instagram
prabhnair?...
#cybersecurity #infosec #soc #cyber #siem #networksecurity

Пікірлер: 15
@vaibhavgupta7584
@vaibhavgupta7584 8 ай бұрын
Lovely Video. Thanks for sharing. please continue to make videos in this series
@mukeshmaharana7255
@mukeshmaharana7255 8 ай бұрын
Great video.. please continue this series..
@mayurtakle3862
@mayurtakle3862 8 ай бұрын
Nice Informative Video. Please continue to make videos in this series.
@navinreddy-xx1vo
@navinreddy-xx1vo 4 ай бұрын
Very well explained, Thanks for video
@Sabuz73
@Sabuz73 8 ай бұрын
Very informative. I expect more use case related videos with examples.
@premajainapure7023
@premajainapure7023 8 ай бұрын
You have great knowledge sir, thanks for the informatioj
@SalamaAltalla
@SalamaAltalla 8 ай бұрын
Hi Prabh sir, Really Great informative video, and I appreciate your efforts to make this video happen. Thanks very much for your dedication towards the cyber security domain 🙏 PLEASE continue this series & add more use cases & different scenarios.
@eliasinaciowilks6939
@eliasinaciowilks6939 4 ай бұрын
Nice informative video
@manickamkagamalai5836
@manickamkagamalai5836 8 ай бұрын
Hi Prabh Good session expecting more use cases
@rahulove30
@rahulove30 8 ай бұрын
Hi sir This one of the best use case video If you have more videos related to use case like incident response So please share with us Thankyou so much
@sachin-tr4nc
@sachin-tr4nc 8 ай бұрын
Hi Prabh sir, Really Great informative video , appreciate your efforts to make this video happen after request, which show your dedication towards cyber security domain 🙏 One more Request sir, please please continue this series & add more use cases & different scenarios, Fine Tuning use cases, creating custom Parser & please Make video Pratical in Nature for this Topics to be covered Now, which will help us to learn the topic indepth Once again Thank you very much sir for accepting Topic request & making it happen Thanks in Advance & Have a great year ahead
@santoshibisht271
@santoshibisht271 2 ай бұрын
Please sync the video and audio it starts around @1 minute and it continued till end.
@bimben50
@bimben50 4 ай бұрын
The video is nice but the recording is lagging.
@PrabhNair1
@PrabhNair1 4 ай бұрын
Any timestamp ?
@SVenkatesh-dn4vp
@SVenkatesh-dn4vp 4 ай бұрын
​@@PrabhNair1 I think it's around 7:00 the voice and the video is not correctly synced but the content is well informative and thank you for yourwork
Epic Security Models in 2024 Explained
19:12
EverlastCyber
Рет қаралды 234
Survival skills: A great idea with duct tape #survival #lifehacks #camping
00:27
The child was abused by the clown#Short #Officer Rabbit #angel
00:55
兔子警官
Рет қаралды 25 МЛН
БОЛЬШОЙ ПЕТУШОК #shorts
00:21
Паша Осадчий
Рет қаралды 9 МЛН
EDR vs. XDR: A Practical Guide to Next-Gen Cybersecurity
24:27
Prabh Nair
Рет қаралды 16 М.
Introduction to  Cyber Threat Hunting : SOC
24:12
Prabh Nair
Рет қаралды 26 М.
MITRE Practical Use Cases
18:43
H & A Security Solutions
Рет қаралды 18 М.
What is SIEM? Why it is a Useful tool in Cyber Security
59:21
SIEM XPERT
Рет қаралды 4 М.
MITRE ATT&CK Framework in Hindi.... #cybersecurity #mitre #threathunting
53:59
Center for Cyber Security Studies & Research
Рет қаралды 5 М.
Top Interview Questions For GRC , Auditor , Consultants  Learners
25:10
QRadar: All about QRadar Rules - Part 1
22:50
IBM Helps
Рет қаралды 7 М.
How to Write Information Security Policy
27:45
Prabh Nair
Рет қаралды 16 М.
КРУТОЙ ТЕЛЕФОН
0:16
KINO KAIF
Рет қаралды 4,8 МЛН
$1 vs $100,000 Slow Motion Camera!
0:44
Hafu Go
Рет қаралды 8 МЛН