Тёмный

SIEM Correlation Rules for Beginners 

Prabh Nair
Подписаться 101 тыс.
Просмотров 9 тыс.
50% 1

If you're new to the world of data correlation and want to learn the basics, then this video is for you! I'll be discussing correlation rules in SIEM and explaining what they are and how you can use them to find insights in your data. SIEM correlation rules are essential for detecting security threats and incidents in your organization. By correlating events from different sources, you can identify patterns and anomalies that would be difficult to spot otherwise.
In this video, you'll learn how to develop effective SIEM correlation rules. We'll cover the basics of event correlation, as well as some more advanced techniques. You'll also learn some best practices for developing and managing SIEM correlation rules.
Ransomware Series
• Ransomware Series
SOC Interview Questions
• SOC Analyst Introducti...
Playlist Network Security
• Network Security
GRC Interview Questions
• Mock Job Interview Int...
Internal Auditor Playlist
• Internal Audit
How to make career progression post #isc2 and #isaca
• How to Make a Career P...
How to make career in GRC
• Learn How to Make an A...
How to Build PIMS
• How to Implement Priva...
How to Implement 27001 in an organization
• Implementing ISO 27001...
How to conduct PIA
• How to Conduct Privacy...
How to Make a career in GRC
• Learn How to Make an A...
Telegram Group
t.me/Prabhstudy
Start your career in cybersecurity with free resources .
Cybersecurity Career: How to Make a Career in Cybersecurity 2022 lnkd.in/gCGBnRM7
Pentesting Career
lnkd.in/gQYenKYd
Telegram Group Link
t.me/Prabhstudy
Cybersecurity Guide
• Cybersecurity Guide
Follow me on Instagram
www.instagram.....
#cybersecurity #infosec #soc #cyber #siem #networksecurity

Опубликовано:

 

5 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 16   
@Sabuz73
@Sabuz73 11 месяцев назад
Very informative. I expect more use case related videos with examples.
@mayurtakle3862
@mayurtakle3862 11 месяцев назад
Nice Informative Video. Please continue to make videos in this series.
@mukeshmaharana7255
@mukeshmaharana7255 11 месяцев назад
Great video.. please continue this series..
@prashantchauhan3111
@prashantchauhan3111 12 дней назад
excellent information, would be great if phishing and spamming kind of incident taken care with the help of UEBA.
@vaibhavgupta7584
@vaibhavgupta7584 11 месяцев назад
Lovely Video. Thanks for sharing. please continue to make videos in this series
@SalamaAltalla
@SalamaAltalla 11 месяцев назад
Hi Prabh sir, Really Great informative video, and I appreciate your efforts to make this video happen. Thanks very much for your dedication towards the cyber security domain 🙏 PLEASE continue this series & add more use cases & different scenarios.
@premajainapure7023
@premajainapure7023 11 месяцев назад
You have great knowledge sir, thanks for the informatioj
@navinreddy-xx1vo
@navinreddy-xx1vo 7 месяцев назад
Very well explained, Thanks for video
@sachin-tr4nc
@sachin-tr4nc 11 месяцев назад
Hi Prabh sir, Really Great informative video , appreciate your efforts to make this video happen after request, which show your dedication towards cyber security domain 🙏 One more Request sir, please please continue this series & add more use cases & different scenarios, Fine Tuning use cases, creating custom Parser & please Make video Pratical in Nature for this Topics to be covered Now, which will help us to learn the topic indepth Once again Thank you very much sir for accepting Topic request & making it happen Thanks in Advance & Have a great year ahead
@rahulove30
@rahulove30 11 месяцев назад
Hi sir This one of the best use case video If you have more videos related to use case like incident response So please share with us Thankyou so much
@eliasinaciowilks6939
@eliasinaciowilks6939 7 месяцев назад
Nice informative video
@manickamkagamalai5836
@manickamkagamalai5836 11 месяцев назад
Hi Prabh Good session expecting more use cases
@santoshibisht271
@santoshibisht271 5 месяцев назад
Please sync the video and audio it starts around @1 minute and it continued till end.
@bimben50
@bimben50 7 месяцев назад
The video is nice but the recording is lagging.
@PrabhNair1
@PrabhNair1 7 месяцев назад
Any timestamp ?
@SVenkatesh-dn4vp
@SVenkatesh-dn4vp 7 месяцев назад
​@@PrabhNair1 I think it's around 7:00 the voice and the video is not correctly synced but the content is well informative and thank you for yourwork
Далее
Breaking Down Ransomware: Insights and Analysis
14:14
QRadar: All about QRadar Rules - Part 1
22:50
Просмотров 9 тыс.
Realistic SOC Interview Questions :
19:59
Просмотров 13 тыс.
Splunk Tutorial for Beginners (Cyber Security Tools)
12:22
SOC- Threat intelligence Interview Questions
36:40
Просмотров 30 тыс.