Understanding Sysmon & Threat Hunting with A Cybersecurity Specialist & Incident Detection Engineer
38:28
How Does Quad9 Combine Privacy, Security, and Free Service?
28:07
Detecting Command and Control Frameworks via Sysmon and Windows Event Logging
23:49
A Practical Case of Threat Intelligence – From IoC to Unraveling an Attacker Infrastructure
26:47
Hunting for Hackers with Sigma Rules
10:12
Step-by-Step Guide: Sending Windows Event Logs to Graylog With NXLOG
19:52
Getting Started With MSP & IT Documentation, Best Practices, Tips & Tools
8:54
What is XDR vs EDR vs MDR? Breaking down Extended Detection and Response
24:04