Building an Effective Intrusion Detection Program

Building an Effective Intrusion Detection Program

Security BSides San Francisco via YouTube Direct link

4. Examples: Network monitoring Bro FTW

20 of 21

20 of 21

4. Examples: Network monitoring Bro FTW

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Building an Effective Intrusion Detection Program

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Assumptions
  3. 3 Social stuff: Be nice.
  4. 4 Tool talk: Logging
  5. 5 Re: Logging Log everything
  6. 6 Tool talk: NSM
  7. 7 3. Tool talk: Macs
  8. 8 3. Tool talk: Windows
  9. 9 Examples: Cloud logging. Google Logins.
  10. 10 4. Examples: Cloud logging. Dropbox logins. Example query
  11. 11 Dropbox logins cont.
  12. 12 4. Examples: Windows Office Macro Implants
  13. 13 Skip a few steps...
  14. 14 End result
  15. 15 4. Examples: Windows Powershell
  16. 16 Windows PS cont
  17. 17 4. Examples: Mac implants wlosquery
  18. 18 Mac & osquery cont: (edited for readability)
  19. 19 4. Examples: Mac implants w/Santa
  20. 20 4. Examples: Network monitoring Bro FTW
  21. 21 Q&A Questions? Comments?

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.