Open Source Security Orchestration

Open Source Security Orchestration

BruCON Security Conference via YouTube Direct link

Acting To Investigate A Threat

27 of 34

27 of 34

Acting To Investigate A Threat

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Open Source Security Orchestration

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Overview
  3. 3 Use Cases
  4. 4 Generate Threat Intelligence Feed
  5. 5 Firewall Rule Propagation
  6. 6 Drop Propagation
  7. 7 Capture Threat Activity
  8. 8 Inject Beacon
  9. 9 Redirect Traffic
  10. 10 Reporting Threats
  11. 11 Host Isolation
  12. 12 Additional Logging
  13. 13 Trigger Password Resets
  14. 14 Security Orchestration
  15. 15 Adaptive Network Protocol (ANP)
  16. 16 Packet
  17. 17 Messages
  18. 18 Peering
  19. 19 Multiple Locations
  20. 20 Cloud Assets
  21. 21 Surrogate
  22. 22 Blacklist
  23. 23 Sharing Also Provides
  24. 24 Expanded Visibility
  25. 25 Cooperative Behavior
  26. 26 Acting to Defend The Network
  27. 27 Acting To Investigate A Threat
  28. 28 Acting To Respond To An Incident
  29. 29 Demonstrations
  30. 30 Needed Improvements
  31. 31 Making The Difference
  32. 32 Final Thoughts
  33. 33 iptables
  34. 34 Links

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.