Understanding Sigma Signature Language For Threat Detection | TryHackMe

  Рет қаралды 6,420

Motasem Hamdan | Cyber Security & Tech

Motasem Hamdan | Cyber Security & Tech

Күн бұрын

Пікірлер
@Maccanarchy
@Maccanarchy 6 ай бұрын
Great videos man, you're walk throughs are incredible and I definitely owe you for getting me through the SOC Analyst Level 1. Looking forward to getting through level two now.
@someone2324
@someone2324 4 ай бұрын
you are a great teacher! thank you!
@imveryhungry112
@imveryhungry112 10 ай бұрын
So is there any way to generate sql queries from these signatures now? Or did they get rid of that feature because it was too simple and too logical?
@admar-nelson
@admar-nelson Жыл бұрын
Hi Motasem, Great to get your lessons. I would like to be more clear in sigma. what i need?
@pritamdatta6692
@pritamdatta6692 Жыл бұрын
Hey, can you please make a video on "Lateral Movement and Pivoting" from Red Team Training?
@emreislamalmal4256
@emreislamalmal4256 Ай бұрын
Where is task 1 2 3 4?
@Pl4s_m4
@Pl4s_m4 Жыл бұрын
Thanks for the video..
@Baile_an_Locha
@Baile_an_Locha Жыл бұрын
Good until you showed the example…text way too small to read.
@imveryhungry112
@imveryhungry112 10 ай бұрын
This framework is total bs. IT IS NOT AGNOSTIC. It requires VERY SPECIFIC siem frameworks to build queries from the signatures.
@johnvardy9559
@johnvardy9559 Жыл бұрын
σ that's Greek letter 👏
The Cyber Kill Chain Explained | Threat Intelligence | TryHackMe
28:42
Motasem Hamdan | Cyber Security & Tech
Рет қаралды 7 М.
How to Level Up Your SOC Analyst Skill with Power Tool: Sigma
35:37
Gerald Auger, PhD - Simply Cyber
Рет қаралды 13 М.
How Strong Is Tape?
00:24
Stokes Twins
Рет қаралды 96 МЛН
She made herself an ear of corn from his marmalade candies🌽🌽🌽
00:38
Valja & Maxim Family
Рет қаралды 18 МЛН
Мен атып көрмегенмін ! | Qalam | 5 серия
25:41
Why Not? Real Estate Podcast - Interview with Bob Murray
1:04:35
WHY NOT? Real Estate Podcast
Рет қаралды 6
SIEM Rule Creation Made Easy! Praeco/Elastalert and SIGMA
24:42
Taylor Walton
Рет қаралды 11 М.
Cyber Threat Intelligence Platforms | OpenCTI | TryHackMe
23:09
Motasem Hamdan | Cyber Security & Tech
Рет қаралды 7 М.
Kerberoasted Lab - Cyber Defenders
17:48
Rian Alsagheer - Cybersecurity
Рет қаралды 33
Hunt for Hackers with Velociraptor
13:51
John Hammond
Рет қаралды 99 М.
How to Use Logs, Alerts, and Behavior to Detect APTs & TTPs
1:30:37
Immersive Labs
Рет қаралды 7 М.
VPN Logs Investigation and Data Analytics With Elastic Stack | TryHackMe | Cyber Security
35:59
Motasem Hamdan | Cyber Security & Tech
Рет қаралды 4,7 М.
Introduction to Cyber Threat Intelligence | TryHackMe
26:34
Motasem Hamdan | Cyber Security & Tech
Рет қаралды 12 М.
Basics of Osquery For CyberSecurity | TryHackMe Osquery: The Basics
27:31
Motasem Hamdan | Cyber Security & Tech
Рет қаралды 8 М.
Yara Rules Explained | Complete Tutorial | TryHackMe Yara
29:26
Motasem Hamdan | Cyber Security & Tech
Рет қаралды 8 М.
How Strong Is Tape?
00:24
Stokes Twins
Рет қаралды 96 МЛН