SOC 101: Real-time Incident Response Walkthrough

preview_player
Показать описание
Interested to see exactly how security operations center (SOC) teams use SIEMs to kick off deeply technical incident response (IR) processes? To some, it might seem daunting watching IR folks do memory and network forensics; how do they know where to look and what to look for if there are 100,000 devices on the network? On this in-depth demo, cybersecurity consultant and InfoSec skills author, Keatron Evans, looks at how the process works and why a good SIEM solution is no longer a 'nice to have' but an absolute requirement for any organization's cyber threat intelligence.

LEARN MORE:

GET A DEMO:

ABOUT EXABEAM:

CONNECT WITH US:
Рекомендации по теме
Комментарии
Автор

Been an Ent Architect for 25+ yrs and that’s the best clearest, most concise explanation of determining how best to find hidden processes on computers. Thanks.

rmcgraw
Автор

I felt this 12 minutes like 5 minutes. That's when you can tell it's a good video. Entertaining, informative and educational.

laureanocavallo
Автор

As a new soc analyst, I found this video very valuable! I got so much insight in such a short amount of time as well as how you should investigate and look into activities. Thanks a ton!

sielecassharpe
Автор

Finally, a real look into the trenches of SOC and IR.
Please keep up a good work!

xrZt
Автор

This is great. It is rare to find such a good walkthrough on this stuff. Thanks!

MereAYT
Автор

This was an amazing video! I recently got a job as a IR team member after a few years of being a network analyst. Although I have the foundations, I am very new to the job itself so this type of video helps me so much! I will definitely be subscribing!

FracturesHD
Автор

Why does this only have 1.5k views?

Great walkthrough sir.

nicksmith
Автор

I'm trying to get a job as a SOC Analyst Tier 1. I was told that Exabeam was used in addition to Splunk. I am grateful for these videos as they really give a good demonstration and let the viewer see how this works. The dashboard looks great and user friendly, and the ability to move from the dashboard to investigating the alert is a nice thing to see.

johnpiernicky
Автор

Dang Keatron you break it down like this was a sermon !! This is awesome

draperw
Автор

Thanks for the great behind the scenes look into SIEM monitoring. It's sad that I have a degree from a technical college, and there were hardly any labs, just all theory. I naturally have an investigative mindset so this really intrigues me and I would love to get back into training. Keatron, where does one start?

libnatty
Автор

Exactly the kind of content I needed!! Thanks a billion

WilliamSalisbury
Автор

Thank you for sharing. I have been trying to get an entry-level job as a SOC, and 😐it's an exciting role.

tinatwintinny
Автор

I’m only 4:18 in and I must say this is an excellent video.

miloboy
Автор

Good content! I look forward to part 2.

dgmckenzie
Автор

A+ material. i will be ready for my upcoming table top exercise. Thanks a bundle!

threadripper
Автор

Whew would recommend this video to anyone! Thank you for a value add!

daslynhug
Автор

This was excellent: short, informative, and clear. Thank you!

xCheddarBbx
Автор

Hi, thanks for the video. Although you mentioned it, using the md5 command is a lot better and quicker as it gives you the instant hash which you can copy and paste into VT.

_amintrouble
Автор

just getting in and this was fun to watch

Foxy-bn
Автор

thanks a lot for valuable video please keep doing such a videos very informative. thanks again.

KishorKumar-ze