Courses from 1000+ universities
Discover an easier way to explore affordable, credit-worthy online courses with our expanded community college catalog.
600 Free Google Certifications
Computer Science
Psychology
Cybersecurity
Introducción a la Ciencia de Datos con Python
Functional Foods and Nutraceuticals
Anatomy: Know Your Abdomen
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from Security Onion. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore machine learning techniques for analyzing Bro logs, focusing on supervised and unsupervised methods to enhance cybersecurity threat detection and analysis.
Explore advanced ELSA features for security analysis, including Elasticsearch integration, improved syslog-ng, containerization, and new visualization tools like Ankey and geo mapping.
Explore data-driven perspectives on digital forensics and incident response, focusing on cognitive challenges, investigation processes, and analytical strategies for security professionals.
Explore ICS/SCADA network security monitoring strategies for challenging industrial environments, focusing on real-world applications, threat models, and effective monitoring techniques.
Leveraging Security Onion to identify command and control channels, focusing on various techniques like Echo Request, SSH Tunnel, ICMP, and DNS-based methods for detecting malicious network activities.
Explore detection engineering in Security Onion, covering workflow essentials and best practices for enhancing network security and threat detection capabilities.
Learn essential alert triage and case creation workflows in Security Onion, enhancing your ability to respond effectively to security incidents and manage investigations efficiently.
Security Onion is an open source threat hunting, enterprise security monitoring, and log management tool. This course will teach you the capabilities, configuration, and basic operation of Security Onion.
Explore the new case management interface in Security Onion 2.3.100, enhancing investigation workflows and guiding future analyses with integrated platform features.
Learn essential alert triage and case creation techniques for Security Onion, enhancing your ability to efficiently manage and respond to security incidents in this comprehensive workflow guide.
Panel discussion with Security Onion developers exploring latest developments, challenges, and future directions in cybersecurity monitoring and threat detection.
Comprehensive overview of Security Onion's latest developments, features, and future roadmap, presented by Doug Burks at the annual conference.
Explore how Security Onion integrates with automation tools for enhanced incident response, enabling faster threat detection and improved security operations efficiency.
Explore automated incident response with Security Onion, n8n, and Velociraptor. Learn to set up a zero-cost detection and response orchestration system for enhanced cybersecurity workflows.
Comprehensive guide to Security Onion setup, covering essential installation steps and configuration for effective network security monitoring and threat detection.
Get personalized course recommendations, track subjects and courses with reminders, and more.