Тёмный

SOC- Threat intelligence Interview Questions 

Prabh Nair
Подписаться 91 тыс.
Просмотров 29 тыс.
50% 1

In this video I have covered #threatintelligence #interviewquestions session
SOC Analyst Session Series
• SOC

Опубликовано:

 

17 июл 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 29   
@kaushiksingh1524
@kaushiksingh1524 Год назад
Your way of explanation is so good.
@NSSK1
@NSSK1 Год назад
Hi My Best Instructor, Mr. Prabh Nair Sir. Thanks for all your efforts and best way of explanation.🙂
@navinreddy-xx1vo
@navinreddy-xx1vo 4 месяца назад
Nice explanation, Thanks for your time
@Rajan_Kr_Sahu
@Rajan_Kr_Sahu Год назад
Jabardast video h sir notes 📝 banaya hoon
@presidenthola4599
@presidenthola4599 2 года назад
I can’t believe this post doesn’t have millions of views with all this information
@PrabhNair1
@PrabhNair1 Год назад
thanks a lot :)
@umerkha
@umerkha Год назад
Why this video doesn’t have a million views? Probably because there aren’t millions of threat intelligence people in the world? Simp
@ianlondon2888
@ianlondon2888 3 месяца назад
Great review.
@jahnavinudurupati9596
@jahnavinudurupati9596 7 месяцев назад
Hi sir. This is really useful. Thank you
@Rajan_Kr_Sahu
@Rajan_Kr_Sahu Год назад
Nice video sir ji 🙏
@ian230187
@ian230187 Год назад
Great video
@PrabhNair1
@PrabhNair1 Год назад
thanks a lot :)
@sssharo
@sssharo 6 месяцев назад
The besttttt❤❤❤❤❤❤
@muniya1991
@muniya1991 13 дней назад
Explanation ❤
@Themusicbiz
@Themusicbiz Год назад
2:40 I would argue the threat is the vulnerability, and the threat actor is the attacker. Also, a threat could be an attacker or govt entity historically known to possess and make use of zero days. Meaning my answer would be all, the action of exploiting a vulnerability is a threat to our service, the vulnerability itself is the biggest threat as it is the weakness itself, but also advocate for the monitoring and understanding of adversaries themselves 🎉 hire meeeee
@malloryr4883
@malloryr4883 Год назад
Risk = Threat * Vulnerability. Vulns mean nothing if they can't be exploited, that's why air-gapped networks exist.
@Themusicbiz
@Themusicbiz Год назад
@@malloryr4883 well yeah but show me anywhere air gapping is a solution
@nikhilyerpula9839
@nikhilyerpula9839 2 года назад
nice
@PrabhNair1
@PrabhNair1 Год назад
thanks a lot :)
@Rajan_Kr_Sahu
@Rajan_Kr_Sahu Год назад
Itna aacha youtube channel jaldi milta kaha h
@omkar-js3mz
@omkar-js3mz 2 года назад
Can u please provide complete roadmap to become SoC analyst,
@PrabhNair1
@PrabhNair1 2 года назад
there is an old video do check
@omkar-js3mz
@omkar-js3mz 2 года назад
What should be study material i refer for SoC analyst,plz help me
@PrabhNair1
@PrabhNair1 Год назад
start with soc books
@omkar-js3mz
@omkar-js3mz Год назад
@@PrabhNair1 can you suggest book name with author
@aaronc3396
@aaronc3396 9 месяцев назад
Is the answer: siem and firewall ?
@roadsowncountry4432
@roadsowncountry4432 Год назад
Play at 1.5X Speed and enjoy the video
@PrabhNair1
@PrabhNair1 Год назад
thanks a lot :)
@joemorgan2253
@joemorgan2253 Год назад
Try at .5 lol
Далее
The Cycle of Cyber Threat Intelligence
1:00:27
Просмотров 112 тыс.
Introduction to  Cyber Threat Hunting : SOC
24:12
Просмотров 26 тыс.
Overview of SIEM : Most Pratical Appraoch
14:25
Просмотров 39 тыс.
SoC Analyst Important Interview Questions and Answers
24:48
Realistic SOC Interview Questions :
19:59
Просмотров 10 тыс.
SOC Analyst Interview Questions 1 2022
13:42
Просмотров 40 тыс.