
Sign up to save your podcasts
Or
In our last episode, we interviewed John Strand of Black Hills Information Security. Now it’s time to analyze what he said. For this episode, we’re looking at the technical side of the interview. We’re saving the training portion for another episode.
LINKS
1. The Essential 8 from Australia
2. DeepBlueCLI
3. Sysmon
4. Elastic Stack - ELK
5. Security Onion
6. LogonTracer
7. sigma
8. JPCERT Tools
9. JPCERT: Tool Analysis Results Sheet
FIND US ON
1. Facebook
2. Twitter - DamienHull
4.2
1919 ratings
In our last episode, we interviewed John Strand of Black Hills Information Security. Now it’s time to analyze what he said. For this episode, we’re looking at the technical side of the interview. We’re saving the training portion for another episode.
LINKS
1. The Essential 8 from Australia
2. DeepBlueCLI
3. Sysmon
4. Elastic Stack - ELK
5. Security Onion
6. LogonTracer
7. sigma
8. JPCERT Tools
9. JPCERT: Tool Analysis Results Sheet
FIND US ON
1. Facebook
2. Twitter - DamienHull