Profiling the Attacker - Using Offender Profiling in SOC Environments by James Stevenson

Profiling the Attacker - Using Offender Profiling in SOC Environments by James Stevenson

Bugcrowd via YouTube Direct link

Security operations

3 of 8

3 of 8

Security operations

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Profiling the Attacker - Using Offender Profiling in SOC Environments by James Stevenson

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 What is it
  3. 3 Security operations
  4. 4 Asset profiling
  5. 5 Cyberkill chain
  6. 6 Questions
  7. 7 Method 55
  8. 8 Summary

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.