Sweet Security - Deploying a Defensive Raspberry Pi

Sweet Security - Deploying a Defensive Raspberry Pi

via YouTube Direct link

Dictionary Hash

14 of 30

14 of 30

Dictionary Hash

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Sweet Security - Deploying a Defensive Raspberry Pi

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Network Security Monitoring
  3. 3 Log Stash
  4. 4 Qabbani
  5. 5 Log Stash Configuration File
  6. 6 Log Normalization
  7. 7 Custom Patterns
  8. 8 Normalization
  9. 9 Conditional Statements
  10. 10 Add Field
  11. 11 GeoIP
  12. 12 Date Matching
  13. 13 Translate
  14. 14 Dictionary Hash
  15. 15 External Sources
  16. 16 Email Output
  17. 17 Email Alerts
  18. 18 Cabana Dashboard
  19. 19 Threat Intel Feed
  20. 20 Scripts
  21. 21 Environment Overview
  22. 22 Leonardo DiCaprio
  23. 23 Network Scanning
  24. 24 OpenBoss
  25. 25 Commercial Options
  26. 26 Service Safe
  27. 27 Auto patching
  28. 28 Cost
  29. 29 Future work
  30. 30 Questions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.