Completed
Data Exfiltration
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Analyzing DNS Traffic for Malicious Activity Using Open Source Logging Tools
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Agenda
- 3 The Basics
- 4 Tabasco Story
- 5 Simple Solution
- 6 The Problem
- 7 Other Tools
- 8 Expensive Tools
- 9 Support Levels
- 10 Common denominators
- 11 Log processing
- 12 Log indexing
- 13 Log formatting
- 14 Log shipping
- 15 Log input
- 16 Gray Log Sidegar
- 17 What is Gray Log
- 18 Gray Log 2 Archive
- 19 Elastic Search
- 20 DNS Amplification
- 21 Dashboards
- 22 Data Exfiltration