Completed
Hunting With Splunk
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Cloud Threat Hunting
Automatically move to the next video in the Classroom when playback concludes
- 1 Missed Opportunities
- 2 Roadmap
- 3 Finger Pointing
- 4 Lack of Visibility
- 5 Our Cloud Threat Simulation
- 6 AWS Cloud Hacking Toolkit
- 7 Microsoft Cloud Environment
- 8 Meet The Cloud Hacker
- 9 Instrumentation
- 10 An Anonymous Threat
- 11 Threat Hunting - Create Hypothesis
- 12 AWS Tools
- 13 Guard Duty - "Hacker" Operating System Alert
- 14 Alert Fatigue
- 15 Interview with Anna Demin
- 16 Hunting With Splunk
- 17 Getting Data Into Splunk
- 18 Alert! The Adversary Lists Buckets
- 19 Alert! The Adversary Checks Available Functions
- 20 The User Agent String: A Wealth of Information
- 21 Chained with...
- 22 The Meatballs Are Gone!
- 23 New Host Configuration
- 24 Microsoft Audit Log Search
- 25 Can You Trust Your Tools?
- 26 Use Powershell Instead of the GUI for Better Results
- 27 Splunk Joins The Hunt!
- 28 Adversary - Successful Login
- 29 Adversary Geolocation
- 30 Create Hypothesis - Credential Stuffing
- 31 Mirroring Network Traffic-VTAP
- 32 Hosted Network Monitoring - Extra Hop
- 33 Current Hypothesis
- 34 Takeaways
- 35 Questions?