Media Summary: Anton, a Principal Threat Hunting and Response Analyst in our SOC, walks through a real-world security incident. This case ... In this video, I will be exploring the process of performing Kevin Zuk, Threat Hunting Engineer at Anvilogic, leads a hands-on workshop on what
Lateral Movement Windows Services - Detailed Analysis & Overview
Anton, a Principal Threat Hunting and Response Analyst in our SOC, walks through a real-world security incident. This case ... In this video, I will be exploring the process of performing Kevin Zuk, Threat Hunting Engineer at Anvilogic, leads a hands-on workshop on what Dear Defronixters !! This is the 10th Class of our SOC Analyst Job Ready Free Blue Teaming Course by Defronix Cyber Security. Welcome to Zero Trust Cyber Tips and Tricks. In today's video we will be talking about Mitre ATT&CK Tactics and Techniques. Active Directory remains one of the most targeted environments in enterprise networks. In this webinar, we break down how ...
In this video we'll be exploring how to attack, detect and defend against the abuse of Principal Security Specialists Phil Hagen and Brian Donohue break down some of the techniques attackers use to traverse ... WSUS Abuse has been around for a while, so this video is not demonstrating anything groundbreaking. But it certainly is fun using ... Welcome to the Defender Experts for XDR Video Series. In this series, we aim to cover key aspects of Defender Experts for XDR ... Is there a security boundary between Active Directory and Entra ID in a hybrid environment? The answer to this question, while ... This hands-on, scenario-driven workshop delves into how attackers
If you are new and interested in what has to offer, then you are in the right place! We are taking a look at the ...