Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Collect All the Data - Protect All the Things

via YouTube

Overview

Explore a comprehensive conference talk that delves into data collection and protection strategies across various domains. Learn about network and machine data, Windows logs, graph theory, and air gap popping techniques. Discover insights on hardware supply chain interdiction, endpoint analysis, asset detection, and network sigma. Gain knowledge about OS query, application data utilization, protocol metadata, and the role of J3 and Salesforce in data management. Understand the analyst's perspective, intelligence operations workflow, and the concept of Protoss. Examine outliers and J3 ER to round out your understanding of modern data collection and protection methodologies.

Syllabus

Intro
Pluralsight
Presentation Overview
Network
Machine Data
Windows Logs
Graph Theory
AirGap Popping
Hardware Supply Chain Interdiction
Endpoint Analysis
Asset Detection
Network Sigma
OS Query
Application Data
As Your Sentinel
Protocol Metadata
J3 and Salesforce
The Analyst
Intelligence
Operations Workflow
Protoss
Outliers
J3 ER

Reviews

Start your review of Collect All the Data - Protect All the Things

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.