Threat Hunting in the Modern SOC with Splunk

1:00:45
An Introduction to Threat Hunting With Zeek (Bro)

14:22
Cybersecurity Architecture: Endpoints Are the IT Front Door - Guard Them

17:34
Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)

24:12
Introduction to Cyber Threat Hunting : SOC

14:07
Cybersecurity Architecture: Roles and Tools

4:00:37
4 Hours Chopin for Studying, Concentration & Relaxation

28:27
Real world use cases for NDR in the Cloud

36:14