How To Use SysMon to Really See What’s Happening on Endpoints Webcast 2017
1:43:54
Threat Detection and Hunting for Common MITRE ATT&CK Techniques
51:01
Threat Hunting via Sysmon - SANS Blue Team Summit
1:06:21
What Event Logs? Part 1: Attacker Tricks to Remove Event Logs
1:43:51
Top Windows Event Logs for User Behavior Analysis
42:16
Putting MITRE ATT&CK™ into Action with What You Have, Where You Are presented by Katie Nickels
1:28:32
Exploring the 3 Major Threat Detection Methods: Signature, Behavior, Machine Learning | Webinar
1:29:06
Building MITRE ATT&CK Technique Detection into Your Security Monitoring Environment
54:56