Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the world of DIY threat intelligence in this DefCamp 2016 conference talk. Dive into the importance of threat intel and learn how to implement it effectively using the Plan-Do-Check-Act methodology. Discover practical ideas for setting up and utilizing Splunk, including installation, forwarding, indexing, and searching techniques. Master the creation of scheduled searches and dynamic dashboards to enhance your threat intelligence capabilities. Gain valuable insights into improving your organization's cybersecurity posture through hands-on threat intelligence practices.
Syllabus
Introduction
Disclaimer
Threat Intel
Why Threat Intel
PlanDoCheckAct
Ideas
Splunk
Splunk Setup
Plonk
Splunk Forward
Splunk Index
Splunk Search
Scheduled Search
Schedule Search
Splunk Dashboard
Dashboards
Conclusion
Taught by
DefCamp