Sweet Security - Deploying a Defensive Raspberry Pi

Sweet Security - Deploying a Defensive Raspberry Pi

Security BSides San Francisco via YouTube Direct link

Introduction

1 of 39

1 of 39

Introduction

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Sweet Security - Deploying a Defensive Raspberry Pi

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Network Security Monitoring
  3. 3 Log Stash
  4. 4 Elastic Search Database
  5. 5 Logstash
  6. 6 Install Kabana
  7. 7 Log Stash Configuration File
  8. 8 Log Normalization
  9. 9 Custom Patterns
  10. 10 Normalization
  11. 11 Conditional Statements
  12. 12 GeoIP
  13. 13 Remove key fields
  14. 14 Date matching
  15. 15 Translate
  16. 16 Dictionary Hash
  17. 17 External Sources
  18. 18 Email Output Plugin
  19. 19 Email Alerts
  20. 20 Cabana Dashboard
  21. 21 Threat Intel Feed
  22. 22 GeoIP Map
  23. 23 Scripting
  24. 24 Environment Overview
  25. 25 Leonardo DiCaprio
  26. 26 Network Scanning
  27. 27 Suite Security
  28. 28 Recommendations
  29. 29 Email Alert
  30. 30 Service Safe
  31. 31 Auto patching
  32. 32 Cost
  33. 33 Raspberry Pi 3
  34. 34 Firewall Integration
  35. 35 Security Onion
  36. 36 Wrapup
  37. 37 Dots in rows logs
  38. 38 Have I had a chance to play with 22
  39. 39 Any other questions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.