The Cyber Kill Chain and How to Identify Indicators of Compromise

preview_player
Показать описание
In this video, I breakdown the top indicators of compromise, the cyber kill chain, and show how to apply these indicators to each step in the cyber kill chain framework. My goal for this video was to introduce real-world problems that occur in the field and help the viewer better understand these events.

Рекомендации по теме
Комментарии
Автор

What a great video! Thank you. I havent come across a detailed categorization exercise like this before.

jcohen
Автор

Excellent content. Thank you very much for sharing your knowledge with the community..

syh
Автор

Fantastic work, Cyber Gray! Cool name 😎.
Great power point presentation and useful information.

SoberCatboy
Автор

Very interesting video! Thanks for this

khayla_matthews
Автор

Excellent Video. Thanks for sharing this nice content.

hasan
Автор

Hello, is there a way to contact you if i have a question about something i don't want to discuss publicly?

JamesFloydisnotmyname
Автор

Nice video. Next time volume down the bg music

khanfurman
Автор

"and they make signature-based anti-virus nearly useless" This is only true for hash based signatures and I've never heard of an organization that exclusively uses hash based signatures.

chownful