Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Sweet Security - Deploying a Defensive Raspberry Pi

Security BSides San Francisco via YouTube

Overview

Explore how to deploy a defensive Raspberry Pi for IoT security in this 36-minute conference talk from BSidesSF 2016. Learn about using open-source software and free tools to monitor, protect, and mitigate threats in IoT environments. Discover the implementation of Network Security Monitoring, Log Stash, Elastic Search Database, and Kabana on inexpensive hardware. Dive into log normalization, custom patterns, conditional statements, GeoIP integration, and email alerts. Gain insights on creating Cabana dashboards, incorporating threat intel feeds, and setting up network scanning. Understand the benefits of Suite Security, auto-patching, and firewall integration. Get recommendations for cost-effective solutions using Raspberry Pi 3 and explore the potential of Security Onion for enhanced protection.

Syllabus

Introduction
Network Security Monitoring
Log Stash
Elastic Search Database
Logstash
Install Kabana
Log Stash Configuration File
Log Normalization
Custom Patterns
Normalization
Conditional Statements
GeoIP
Remove key fields
Date matching
Translate
Dictionary Hash
External Sources
Email Output Plugin
Email Alerts
Cabana Dashboard
Threat Intel Feed
GeoIP Map
Scripting
Environment Overview
Leonardo DiCaprio
Network Scanning
Suite Security
Recommendations
Email Alert
Service Safe
Auto patching
Cost
Raspberry Pi 3
Firewall Integration
Security Onion
Wrapup
Dots in rows logs
Have I had a chance to play with 22
Any other questions

Taught by

Security BSides San Francisco

Reviews

Start your review of Sweet Security - Deploying a Defensive Raspberry Pi

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.