Jupyter Notebooks and Pre-recorded Datasets for Threat Hunting - SANS THIR Summit 2019

31:16
BZAR – Hunting Adversary Behaviors with Zeek and ATT&CK - SANS THIR Summit 2019

13:07
Jupyter Notebooks vs Python Scripts | When to Use Which?

35:01
Finding and Decoding Malicious Powershell Scripts - SANS DFIR Summit 2018

18:30
Threat Hunting with Network Flow - SANS Threat Hunting Summit 2017

31:22
Common misconceptions and mistakes made in Threat Hunting

56:15
Become a Jupyter Notebooks Ninja – MSTICPy Fundamentals to Build Your Own Notebooks

30:21
Tutorial do Notebook Jupyter: Introdução, Configuração e Passo a Passo

30:55