filmov
tv
Zeek-Bro Security Monitoring with Tim Garcia
Показать описание
This video is about threat detection using the open source tool, Zeek/Bro to perform traffic logging and security monitoring on corporate networks by Tim Garcia, SANS instructor (Tool Time with Tim) VP-CISSP,GSEC,GCDA,GCCC,GMON,GCED
Can a 20 year old technology help give you strategic visibility into a modern enterprise netowork? The answer is yes!. Welcome to a powerful network monitoring/logging tool most people have never heard of.
Tim Garcia will review the capabilities and use of the the Zeek and Bro IDS (two separate tools that are often used together) for security threat hunting.
(Originally the presentation was to be on the use of the Yara scripting tool to identify malware signatures but the Zeek/Bro topic won out due to popular demand).
Tim is SANS Instructor primarily focused on blue team activities, ethical hacking, incident handling, security management and general information security principles. Instructor in Information Systems Security, Systems Analysis and Project Management for several local universities in the Phoenix area.
Can a 20 year old technology help give you strategic visibility into a modern enterprise netowork? The answer is yes!. Welcome to a powerful network monitoring/logging tool most people have never heard of.
Tim Garcia will review the capabilities and use of the the Zeek and Bro IDS (two separate tools that are often used together) for security threat hunting.
(Originally the presentation was to be on the use of the Yara scripting tool to identify malware signatures but the Zeek/Bro topic won out due to popular demand).
Tim is SANS Instructor primarily focused on blue team activities, ethical hacking, incident handling, security management and general information security principles. Instructor in Information Systems Security, Systems Analysis and Project Management for several local universities in the Phoenix area.
Zeek-Bro Security Monitoring with Tim Garcia
vZW20 - Day 3 - Packet Analyzers - Jan Grashöfer & Tim Wojtulewicz
A Technical Introduction to Zeek/Bro, Network Security's Best Kept Secret
How to Detect SMB Abuse Using Zeek
Zeek in Action, Video 10, Examining the Four Types of Network Security Monitoring Data
Intro to Zeek - Virtually Testing
An Introduction to Threat Hunting With Zeek (Bro)
Zeek in Action, Video 7, Capture Loss Statistics
[OLF 2019] Zeek and Ye Shall Find: Introduction to Zeek
Zeek Webinar - Zeek@Meta: Scale, Log Enrichment and Detections
Using Bro to Hunt Persistent Threats by Benjamin Klimkowski
Introduction to network forensics using Zeek (Bro), Snort and OSINT
Distributed Network Detection with Bro and The Cloud by Mike Reeves
The Power of Zeek (formerly Bro)
How to find C2 activity with Zeek and MITRE ATT&CK
Using Zeek/Bro To Discover Network TTPs of MITRE ATT&CK™ Part 2
BroCon 2017 Welcome and State of Bro Project by Adam Slagell
Cutting through network forensic data with Zeek
12 Days of Defense - Day 2: How to use Zeek for PCAP Analysis
Zeek From Home – Looking Deeper into the Zeek 3.0 - Tim Wojtulewicz - 13 May 2020
Book of Zeek
Creating the Bro RFB (VNC) parser by Martin van Hensbergen
Mick Douglas and what you'll learn from Zeek: Network Monitoring with Cheat Modes
Using Zeek/Bro To Discover Network TTPs of MITRE ATT&CK™ Part 1
Комментарии