Sec503: Network Monitoring And Threat Detection In Depth

Microsoft Azure: Security Monitoring and Threat Detection  eBooks & eLearning

Posted by lucky_aut at Oct. 4, 2024
Microsoft Azure: Security Monitoring and Threat Detection

Microsoft Azure: Security Monitoring and Threat Detection
Released: 10/4/2024
Duration: 1h 23m | .MP4 1280x720, 30 fps(r) | AAC, 48000 Hz, 2ch | 160 MB
Genre: eLearning | Language: English

Network Monitoring and Analysis with Bash  eBooks & eLearning

Posted by IrGens at Oct. 5, 2023
Network Monitoring and Analysis with Bash

Network Monitoring and Analysis with Bash
.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 1h 12m | 195 MB
Instructor: Ricardo Reimao

CyberSec First Responder: Threat Detection & Response CFR210  eBooks & eLearning

Posted by ELK1nG at June 7, 2021
CyberSec First Responder: Threat Detection & Response CFR210

CyberSec First Responder: Threat Detection & Response CFR210
MP4 | Video: h264, 1280x720 | Audio: AAC, 48000 Hz
Language: English | Size: 9.89 GB | Duration: 12h 2m

CyberSec First Responder: Threat Detection and Response (Exam CFR-210)

Vigilant Leader: Enhancing Foresight And Threat Detection  eBooks & eLearning

Posted by ELK1nG at June 28, 2024
Vigilant Leader: Enhancing Foresight And Threat Detection

Vigilant Leader: Enhancing Foresight And Threat Detection
Published 6/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 596.50 MB | Duration: 1h 25m

Enhancing Foresight in Leadership: Learn Vigilant Leadership, Threat Detection, Data Analysis, and Crisis Management

Crash Course on Network Monitoring - With White Animations!  eBooks & eLearning

Posted by Sigha at Aug. 26, 2020
Crash Course on Network Monitoring - With White Animations!

Crash Course on Network Monitoring - With White Animations!
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 44100 Hz, 2ch | Size: 247 MB
Genre: eLearning Video | Duration: 10 lectures (43 mins) | Language: English

This course is a beginner-friendly introduction to Network Monitoring - and it has FUN Whiteboard Animations!

Microsoft Cybersecurity Pro Track: Threat Detection  eBooks & eLearning

Posted by Sigha at April 23, 2021
Microsoft Cybersecurity Pro Track: Threat Detection

Microsoft Cybersecurity Pro Track: Threat Detection
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 44100 Hz, 2ch | Size: 1.45 GB
Genre: eLearning Video | Duration: 26 lectures (6 hour) | Language: English

Learn about Microsoft Threat Detection concepts, tools and services (with Hands-on Lab) and Threat Detection concepts

Network Security Design 101 - Build & Manage Secure Networks  eBooks & eLearning

Posted by lucky_aut at Feb. 21, 2024
Network Security Design 101 - Build & Manage Secure Networks

Network Security Design 101 - Build & Manage Secure Networks
Last updated 2/2024
Duration: 8h6m | .MP4 1280x720, 30 fps(r) | AAC, 44100 Hz, 2ch | 2.45 GB
Genre: eLearning | Language: English

Network Foundations for Network Security and IT

AI for Cybersecurity: Robust models for Authentication, Threat and Anomaly Detection  eBooks & eLearning

Posted by AvaxGenius at July 30, 2023
AI for Cybersecurity: Robust models for Authentication, Threat and Anomaly Detection

AI for Cybersecurity: Robust models for Authentication, Threat and Anomaly Detection by Francesco Bergadano andGiorgio Giacinto
English | PDF | 2023 | 210 Pages | ISBN : 3036582649 | 11.3 MB

Cybersecurity models include provisions for legitimate user and agent authentication, as well as algorithms for detecting external threats, such as intruders and malicious software. In particular, we can define a continuum of cybersecurity measures ranging from user identification to risk-based and multilevel authentication, complex application and network monitoring, and anomaly detection. We refer to this as the "anomaly detection continuum". Machine learning and other artificial intelligence technologies can provide powerful tools for addressing such issues, but the robustness of the obtained models is often ignored or underestimated. On the one hand, AI-based algorithms can be replicated by malicious opponents, and attacks can be devised so that they will not be detected (evasion attacks). On the other hand, data and system contexts can be modified by attackers to influence the countermeasures obtained from machine learning and render them ineffective (active data poisoning). This Special Issue presents ten papers that can be grouped under five main topics: (1) Cyber-Physical Systems (CPSs), (2) Intrusion Detection, (3) Malware Analysis, (4) Access Control, and (5) Threat intelligence.

Yara - Malware Analysis And Threat Detection  eBooks & eLearning

Posted by ELK1nG at Jan. 31, 2024
Yara - Malware Analysis And Threat Detection

Yara - Malware Analysis And Threat Detection
Published 1/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.18 GB | Duration: 3h 6m

Blue Team Defensive Operations

Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint  eBooks & eLearning

Posted by AvaxGenius at April 5, 2024
Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint

Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint by David J. Marchette
English | PDF | 2001 | 339 Pages | ISBN : 0387952810 | 29 MB

In the fall of 1999, I was asked to teach a course on computer intrusion detection for the Department of Mathematical Sciences of The Johns Hopkins University. That course was the genesis of this book. I had been working in the field for several years at the Naval Surface Warfare Center, in Dahlgren, Virginia, under the auspices of the SHADOW program, with some funding by the Office of Naval Research. In designing the class, I was concerned both with giving an overview of the basic problems in computer security, and with providing information that was of interest to a department of mathematicians. Thus, the focus of the course was to be more on methods for modeling and detecting intrusions rather than one on how to secure one's computer against intrusions. The first task was to find a book from which to teach. I was familiar with several books on the subject, but they were all at either a high level, focusing more on the political and policy aspects of the problem, or were written for security analysts, with little to interest a mathematician. I wanted to cover material that would appeal to the faculty members of the department, some of whom ended up sitting in on the course, as well as providing some interesting problems for students. None of the books on the market at the time had an adequate discussion of mathematical issues related to intrusion detection.