Understanding Sigma Signature Language For Threat Detection | TryHackMe

preview_player
Показать описание
In this video walk-through, we covered Sigma signature language that is used to write unified cyber security threat detection rules for SOC analysts and use them across different SIEM solutions.
*************
Receive Cyber Security Field Notes and Special Training Videos
*******
Instagram
Twitter
Facebook
LinkedIn
Website
Patreon
Backup channel
My Movie channel:
******
Рекомендации по теме
Комментарии
Автор

Great videos man, you're walk throughs are incredible and I definitely owe you for getting me through the SOC Analyst Level 1. Looking forward to getting through level two now.

Maccanarchy
Автор

So is there any way to generate sql queries from these signatures now? Or did they get rid of that feature because it was too simple and too logical?

imveryhungry
Автор

Hey, can you please make a video on "Lateral Movement and Pivoting" from Red Team Training?

pritamdatta
Автор

Hi Motasem, Great to get your lessons. I would like to be more clear in sigma. what i need?

admar-nelson
Автор

Good until you showed the example…text way too small to read.

Baile_an_Locha
Автор

This framework is total bs. IT IS NOT AGNOSTIC. It requires VERY SPECIFIC siem frameworks to build queries from the signatures.

imveryhungry