Understanding Sigma Signature Language For Threat Detection | TryHackMe

  Рет қаралды 6,077

Motasem Hamdan | Cyber Security & Tech

Motasem Hamdan | Cyber Security & Tech

Күн бұрын

Пікірлер: 9
@Maccanarchy
@Maccanarchy 5 ай бұрын
Great videos man, you're walk throughs are incredible and I definitely owe you for getting me through the SOC Analyst Level 1. Looking forward to getting through level two now.
@admar-nelson
@admar-nelson Жыл бұрын
Hi Motasem, Great to get your lessons. I would like to be more clear in sigma. what i need?
@someone2324
@someone2324 3 ай бұрын
you are a great teacher! thank you!
@imveryhungry112
@imveryhungry112 8 ай бұрын
So is there any way to generate sql queries from these signatures now? Or did they get rid of that feature because it was too simple and too logical?
@pritamdatta6692
@pritamdatta6692 Жыл бұрын
Hey, can you please make a video on "Lateral Movement and Pivoting" from Red Team Training?
@Pl4s_m4
@Pl4s_m4 Жыл бұрын
Thanks for the video..
@Baile_an_Locha
@Baile_an_Locha 10 ай бұрын
Good until you showed the example…text way too small to read.
@imveryhungry112
@imveryhungry112 8 ай бұрын
This framework is total bs. IT IS NOT AGNOSTIC. It requires VERY SPECIFIC siem frameworks to build queries from the signatures.
@johnvardy9559
@johnvardy9559 Жыл бұрын
σ that's Greek letter 👏
The Cyber Kill Chain Explained | Threat Intelligence | TryHackMe
28:42
Motasem Hamdan | Cyber Security & Tech
Рет қаралды 6 М.
Detecting Cyber Security Threats with Sigma Rules | TryHackMe SigHunt
29:16
Motasem Hamdan | Cyber Security & Tech
Рет қаралды 3 М.
Wait for the last one 🤣🤣 #shorts #minecraft
00:28
Cosmo Guy
Рет қаралды 25 МЛН
Random Emoji Beatbox Challenge #beatbox #tiktok
00:47
BeatboxJCOP
Рет қаралды 55 МЛН
Wait… Maxim, did you just eat 8 BURGERS?!🍔😳| Free Fire Official
00:13
Garena Free Fire Global
Рет қаралды 9 МЛН
REAL MAN 🤣💪🏻
00:35
Kan Andrey
Рет қаралды 12 МЛН
How to Level Up Your SOC Analyst Skill with Power Tool: Sigma
35:37
Gerald Auger, PhD - Simply Cyber
Рет қаралды 12 М.
VPN Logs Investigation and Data Analytics With Elastic Stack | TryHackMe | Cyber Security
35:59
Motasem Hamdan | Cyber Security & Tech
Рет қаралды 4,5 М.
Computer Forensics Tools | Kroll Artifact Parser and Extractor | TryHackMe KAPE
29:57
Motasem Hamdan | Cyber Security & Tech
Рет қаралды 11 М.
Understanding Tactical Detection and Detection Engineering | TryHackMe
19:44
Motasem Hamdan | Cyber Security & Tech
Рет қаралды 1,7 М.
SIEM Rule Creation Made Easy! Praeco/Elastalert and SIGMA
24:42
Taylor Walton
Рет қаралды 11 М.
Splunk Search Processing Language | TryHackMe Splunk: Exploring SPL
41:02
Motasem Hamdan | Cyber Security & Tech
Рет қаралды 1 М.
Introduction to Digital Forensics and Incident Response | TryHackMe DFIR
22:03
Motasem Hamdan | Cyber Security & Tech
Рет қаралды 8 М.
Hunting for Hackers with Sigma Rules
26:47
John Hammond
Рет қаралды 20 М.
How To Use Threat Intelligence To Prevent Cyber Attacks  | TryHackMe Threat Intelligence for SOC
38:58
Motasem Hamdan | Cyber Security & Tech
Рет қаралды 1,2 М.
Investigate an Infected Machine with Splunk | TryHackMe Benign
22:07
Motasem Hamdan | Cyber Security & Tech
Рет қаралды 7 М.
Wait for the last one 🤣🤣 #shorts #minecraft
00:28
Cosmo Guy
Рет қаралды 25 МЛН