IT & Software Pluralsight – Incident Management with Velociraptor

Currently reading:
 IT & Software Pluralsight – Incident Management with Velociraptor

Covers web development, programming, AI, cloud computing, DevOps, and cybersecurity.

baladia

Member
Amateur
LV
4
Joined
Feb 22, 2024
Threads
1,154
Likes
83
Awards
9
Credits
24,497©
Cash
0$
915e68c269595c6d2725cc1c734b185b.jpeg


Released 12/2024
By Brian Dorr
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Level: Intermediate | Genre: eLearning | Language: English + subtitle | Duration: 34m | Size: 99 MB


Velociraptor is an advanced open-source endpoint monitoring, digital forensics, and incident response (DFIR) tool. It allows security pros to collect, query, and analyze data across multiple endpoints, enhancing visibility and response capabilities.
Velociraptor is great for collecting, querying, and analyzing data across multiple endpoints, making it an essential tool for modern security operations. In this course, Incident Management with Velociraptor, you will delve into its powerful features and demonstrate practical applications in real-world scenarios. First, you will be introduced to Velociraptor, providing a solid understanding of its purpose, architecture, and key functionalities. You will learn how to set up and configure Velociraptor to fit your security environment, ensuring you are well-prepared to utilize its full potential. Next, you will focus on hunting across endpoints. You will discover how to perform targeted hunts on a single device or endpoint and explore methods for scaling these hunts across multiple endpoints to maximize coverage and efficiency. Finally, you will explore hunting based on tactics, techniques, and procedures (TTPs). By the end of this course, you will have the skills and knowledge of Velociraptor needed to leverage known TTPs for proactive threat detection, develop the ability to create and execute custom hunts based on common or emerging TTPs, and enhance your detection capabilities by correlating Velociraptor data with threat intelligence.

Link:
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Tips

Similar threads

Top Bottom