Relative Security
Relative Security
  • Видео 212
  • Просмотров 431 654
MITRE's SOC Strategy 0: Building a World-Class SOC from the Ground Up | 11 SOC Strategies Explained
Are you ready to elevate your Security Operations Center (SOC) to world-class status? In this video, we dive into SOC Strategy 0, the foundational approach outlined in MITRE's "11 Strategies for a World-Class SOC" guide. Discover how this strategy emphasizes the importance of clear mission objectives, team alignment, and a proactive mindset to strengthen your SOC's capabilities.
You'll learn:
The core principles of Strategy 0 and why it's essential for success.
How to define your SOC's mission and align it with organizational goals.
Practical steps to implement this strategy in your SOC operations.
Key takeaways to help you build a robust and effective SOC.
Whether you're a SOC manager, analyst...
Просмотров: 35

Видео

Master the Basics of Cybersecurity | Perfect for Security+ and Beyond!
Просмотров 1,4 тыс.19 часов назад
Master the Basics of Cybersecurity | Perfect for Security and Beyond! In this video, we break down fundamental concepts that are essential for anyone preparing for the CompTIA Security certification or other cybersecurity exams. Whether you're just starting your cybersecurity journey or looking for a refresher, this video has you covered! 🚀 📚 Topics Covered: ✔️ What is Information vs. Data? ✔️ ...
Crowdstrike - BSOD - Issue & Remedy
Просмотров 4826 месяцев назад
CrowdStrike has identified and reverted a faulty update causing BSODs due to csagent.sys, impacting critical services. The issue, related to the Falcon Sensor product, is being addressed by their engineering teams. Learn more about the problem and its remedy. Resolution: "Boot Windows into Safe Mode or the Windows Recovery Environment "Navigate to the C:\Windows\System32\drivers\CrowdStrike dir...
What is SOAR (Security, Orchestration, Automation & Response)
Просмотров 1,5 тыс.6 месяцев назад
What is SOAR (Security, Orchestration, Automation & Response)? Want to know how to effectively respond to a security breach? It's crucial to have a solid strategy in place before an incident occurs. In this video, we discuss in detail, How SOAR can help you to efficiently respond to your threats. A SOAR system (Security, Orchestration, Automation & Response) is designed to help you do just that...
CIS Critical Security Controls - Network Monitoring Defense & Security Awareness & Training
Просмотров 1558 месяцев назад
CIS Critical Security Controls - Network Monitoring Defense & Security Awareness & Training Welcome to our latest video on SANS CIS Critical Security Controls - Network Monitoring Defense & Security Awareness & Training! In this episode, we dive deep into critical security controls, focusing on network monitoring defense, and comprehensive security awareness and skills training. If you're invol...
CIS Critical Security Controls - Incident Response Management & Penetration Testing
Просмотров 728 месяцев назад
SANS CIS Critical Security Controls - Incident Response Management & Penetration Testing Welcome to our latest video on SANS CIS Critical Security Controls - Incident Response Management & Penetration Testing! In this episode, we dive deep into critical security controls, focusing on incident response management , and penetration testing. If you're involved in IT, cybersecurity, or enterprise r...
CIS Critical Security Controls - Data Recovery & Network Infrastructure Management
Просмотров 1098 месяцев назад
CIS Critical Security Controls - Data Recovery & Network Infrastructure Management Welcome to our latest video on CIS Critical Security Controls - Data Recovery & Network Infrastructure Management! In this episode, we dive deep into critical security controls, focusing on data recovery and network infrastructure management. If you're involved in IT, cybersecurity, or enterprise risk management,...
CIS Critical Security Controls - Audit Log, Email & Web Protection, Malware Defense
Просмотров 698 месяцев назад
CIS Critical Security Controls - Audit Log, Email & Web Protection, Malware Defense Welcome to our latest video on SANS CIS Critical Security Controls - Audit Log, Email & Web Protection, Malware Defense! In this episode, we dive deep into critical security controls, focusing on Audit Log, Email & Web Protection, Malware Defense. If you're involved in IT, cybersecurity, or enterprise risk manag...
CIS Critical Security Controls - Access Controls and Vulnerability Management
Просмотров 1068 месяцев назад
CIS Critical Security Controls - Access Controls and Vulnerability Management In this informative video, we delve into two critical components of enterprise security: Access Controls and Vulnerability Management. Welcome to our latest video on CIS Critical Security Controls - Access Controls and Vulnerability Management! In this episode, we dive deep into critical security controls, focusing on...
CIS Critical Security Controls - Inventory of Software Assets and Data Protection
Просмотров 1529 месяцев назад
CIS Critical Security Controls - Inventory of Software Assets and Data Protection Welcome to our latest video on CIS Critical Security Controls - Inventory of Software Assets and Data Protection! In this episode, we dive deep into critical security controls, focusing on Inventory of Software Assets and Data Protection. If you're involved in IT, cybersecurity, or enterprise risk management, this...
CIS Critical Security Controls - Secure Configuration and Account Management
Просмотров 869 месяцев назад
CIS Critical Security Controls - Secure Configuration and Account Management Welcome to our latest video on CIS Critical Security Controls - Secure Configuration and Account Management! In this episode, we dive deep into critical security controls, focusing on Secure Configuration and Account Management. If you're involved in IT, cybersecurity, or enterprise risk management, this video is a mus...
CIS Critical Security Controls - Introduction and Inventory of enterprise assets
Просмотров 4899 месяцев назад
CIS Critical Security Controls - Introduction and Inventory of enterprise assets Welcome to our latest video on CIS Critical Security Controls - Introduction and Inventory of enterprise assets! In this episode, we dive deep into critical security controls, focusing on Introduction and Inventory of enterprise assets. If you're involved in IT, cybersecurity, or enterprise risk management, this vi...
Security Operations Center - Incident Response: Eradication, Recovery and Lessons Learnt Explained
Просмотров 19110 месяцев назад
Explore the intricacies of Incident Response with this comprehensive breakdown of the Eradication, Recovery, and Lessons Learned phases. From neutralizing threats to restoring normal operations and gleaning invaluable insights for future resilience, this video offers a deep dive into each crucial stage of incident resolution. Gain a nuanced understanding of how organizations navigate post-incid...
Security Operations Center - Understanding Incident Response: Identification Phase Explained
Просмотров 27210 месяцев назад
In this video, we delve into the crucial phase of Incident Response: Identification. Discover the key steps and strategies involved in identifying security incidents within an organization's infrastructure. From recognizing early signs to determining the scope and impact of an incident, learn how incident responders leverage various techniques and tools to detect and categorize security threats...
Security Operations Center - Understanding Incident Response: Preparation Phase Explained
Просмотров 31410 месяцев назад
🔒 Incident Response Preparation Phase Explained! 🚨 In this video, we delve into the crucial steps organizations take to fortify their cybersecurity defenses during the Preparation Stage of Incident Response. Discover how dedicated incident response teams are assembled and trained, the importance of clear policies and procedures, and the tools utilized for threat detection and analysis. Learn ab...
Demystifying Zero Trust: Building a Secure Future for Your Digital Landscape"
Просмотров 12510 месяцев назад
Demystifying Zero Trust: Building a Secure Future for Your Digital Landscape"
Security Operations Center - What is SIEM
Просмотров 2,5 тыс.10 месяцев назад
Security Operations Center - What is SIEM
Security Operations Center - Introduction to Incident Handling in Cyber Security
Просмотров 35610 месяцев назад
Security Operations Center - Introduction to Incident Handling in Cyber Security
SOC Security Operations Center - SOC as a Service - SOC Roles and Responsibilities - Ep06
Просмотров 1,1 тыс.10 месяцев назад
SOC Security Operations Center - SOC as a Service - SOC Roles and Responsibilities - Ep06
Fundamentals of Information Security
Просмотров 7010 месяцев назад
Fundamentals of Information Security
What is Information Security?
Просмотров 14910 месяцев назад
What is Information Security?
What is Cyber Essentials? A guide for small business security..
Просмотров 39311 месяцев назад
What is Cyber Essentials? A guide for small business security..
What is Operational Security? Why is it Important?
Просмотров 79911 месяцев назад
What is Operational Security? Why is it Important?
CS101 Introduction to Computer Programming - EP25 - Strings Lecture - Urdu/Hindi
Просмотров 44Год назад
CS101 Introduction to Computer Programming - EP25 - Strings Lecture - Urdu/Hindi
CS101 Introduction to Computer Programming - EP24 - Pointers & Functions Lecture - Urdu/Hindi
Просмотров 16Год назад
CS101 Introduction to Computer Programming - EP24 - Pointers & Functions Lecture - Urdu/Hindi
CS101 Introduction to Computer Programming - EP23 - Pointers & Arrays Lecture - Urdu/Hindi
Просмотров 12Год назад
CS101 Introduction to Computer Programming - EP23 - Pointers & Arrays Lecture - Urdu/Hindi
CS101 Introduction to Computer Programming - EP22 - Pointers Revision Lecture - Urdu/Hindi
Просмотров 15Год назад
CS101 Introduction to Computer Programming - EP22 - Pointers Revision Lecture - Urdu/Hindi
CS101 Introduction to Computer Programming - EP21 - Pointers Lecture - Urdu/Hindi
Просмотров 26Год назад
CS101 Introduction to Computer Programming - EP21 - Pointers Lecture - Urdu/Hindi
CS101 Introduction to Computer Programming - EP20 - Multi Dimensional Arrays Example 2 - Urdu/Hindi
Просмотров 9Год назад
CS101 Introduction to Computer Programming - EP20 - Multi Dimensional Arrays Example 2 - Urdu/Hindi
CS101 Introduction to Computer Programming - EP19 - Multi Dimensional Arrays Example 1 - Urdu/Hindi
Просмотров 13Год назад
CS101 Introduction to Computer Programming - EP19 - Multi Dimensional Arrays Example 1 - Urdu/Hindi

Комментарии

  • @Shahzaibkh9
    @Shahzaibkh9 21 день назад

    Watching this before an interview

  • @iranparast45
    @iranparast45 Месяц назад

    perfectly explained thanks

  • @tours3661
    @tours3661 Месяц назад

    One way authentication video

  • @JagadishBhattacharjee-t9k
    @JagadishBhattacharjee-t9k 2 месяца назад

    Hello, I have done all the process, but while starting the service, and checcking the logs, i am getting two warnings, no routes defined and not starting unused module in windows events, what should i do for that?

    • @RelativeSecurity
      @RelativeSecurity 2 месяца назад

      These errors seem to be due to incorrect configuration file. Make sure your configuration file is correct and has all the routes defined.

  • @mahdi9064
    @mahdi9064 2 месяца назад

    would love if there was a link that contains all the xml that you put in each file. you could use scp to send the files that was changed in master to the slaves. its a good way to verify ssh at the same time. the jumping between screens gave me headache, maybe add some edits and just jump to the clip where you actually made a change. good video either way. (y)

    • @RelativeSecurity
      @RelativeSecurity 2 месяца назад

      Thank you for the feedback. Appreciate it :) Regarding the xml files, I no longer have access to those files, but I’ll see if I can get the access then will add it here.

  • @GetachewDubaSagaro
    @GetachewDubaSagaro 2 месяца назад

    Thanks

  • @abokenanaldeek1808
    @abokenanaldeek1808 2 месяца назад

    Very thanks for the great video

  • @MaheshwariBobbala-qo6tu
    @MaheshwariBobbala-qo6tu 2 месяца назад

    Public key is encrypt or decrypt

    • @RelativeSecurity
      @RelativeSecurity 2 месяца назад

      Public key in itself can be encrypted or decrypted depending on the context where it is being used.

  • @aditibhoot2393
    @aditibhoot2393 3 месяца назад

    This was really helpful. Do you have similar information about container security?

    • @RelativeSecurity
      @RelativeSecurity 2 месяца назад

      Glad it was helpful. Not yet but very soon

  • @diksha24.
    @diksha24. 3 месяца назад

    Is there any one who can build SIEM project for me in paid

    • @RelativeSecurity
      @RelativeSecurity 3 месяца назад

      Email @ connect@relativesecurity.com your requirements.

  • @dxvaan
    @dxvaan 3 месяца назад

    Excellent info

  • @rishikeshkumar2312
    @rishikeshkumar2312 3 месяца назад

    Very well explained.. Thank you.... Please explain in details the vendors too

  • @NusrathAlikutty
    @NusrathAlikutty 3 месяца назад

    I can't exactly understand difference between nids and hids please explain more details

  • @NaveenKumar-oi7sb
    @NaveenKumar-oi7sb 3 месяца назад

    Please make videos on all security products

  • @shortvideoking41
    @shortvideoking41 3 месяца назад

    thank you

  • @Ph0eniXBawss
    @Ph0eniXBawss 4 месяца назад

    Very clear and understandable. Thank you very much!

  • @JossOrtan
    @JossOrtan 4 месяца назад

    Great video on Cyber Threat Intelligence! How can businesses effectively implement these practices daily?

  • @mohammedbava9680
    @mohammedbava9680 4 месяца назад

    Malayali?

  • @andraskhan
    @andraskhan 5 месяцев назад

    I really like the way you explain things, thank you very much for your videos

  • @nextstep6403
    @nextstep6403 6 месяцев назад

    This fix is not authentic yet, did it work for anyone?

    • @RelativeSecurity
      @RelativeSecurity 6 месяцев назад

      So far it is the correct resolution. You can follow this link for automatic remediation script gist.github.com/whichbuffer/7830c73711589dcf9e7a5217797ca617

  • @RS-nc5qx
    @RS-nc5qx 6 месяцев назад

    This is the information we need. Thank you for this channel. Btw one question. What program are you using to see those logs? Or can this be seen with command on a terminal.

    • @RelativeSecurity
      @RelativeSecurity 6 месяцев назад

      Appreciate it. You can use baretail log viewer or simple notepad++ does the trick.

  • @UnicTools-d6g
    @UnicTools-d6g 7 месяцев назад

    Wow excellent. Very well explained.

  • @josengoran8345
    @josengoran8345 8 месяцев назад

    Woah extremely well delivered ! very clear, concise

    • @RelativeSecurity
      @RelativeSecurity 8 месяцев назад

      @josengoran8345 Glad you think so! Please consider to subscribe and like the videos :)

  • @tuannguyenanh175
    @tuannguyenanh175 8 месяцев назад

    Would be great to have a video on SOAR architecture, similar to SIEM video. Thanks!

    • @RelativeSecurity
      @RelativeSecurity 6 месяцев назад

      ruclips.net/video/4elHo14GNJE/видео.html. :)

  • @Lima3578user
    @Lima3578user 8 месяцев назад

    can you do a new vlog on SIEM based on latest processes and technologies, how can we apply AI etc

  • @wellsolivieri7766
    @wellsolivieri7766 8 месяцев назад

    *promosm* 🤷

  • @blueshadow3794
    @blueshadow3794 8 месяцев назад

    beautifully explained, clear and to the point. thank you!

  • @dr.moizaabid7370
    @dr.moizaabid7370 8 месяцев назад

    Superb summary on siem. It has been amazing learning from this video.

  • @randomness1o2
    @randomness1o2 9 месяцев назад

    Hello sir, first of all. You are an awesome teacher. But why did you remove SIEM from this playlist?. Please sir share some info.

    • @RelativeSecurity
      @RelativeSecurity 9 месяцев назад

      Thank you. Just wanted to keep SOC beginner videos in one playlist. Even though SIEM video you are referring to is a great resource, however I am planning to create a separate playlist for it, or I’ll rename it and make that a permanent part of this play list. What do you suggest? Thank you for your comments, I am glad it was helpful for you.

    • @randomness1o2
      @randomness1o2 8 месяцев назад

      Sir, your explanation is top notch. The playlist as it was ago, one senior at my work place referred that playlist to me. I was half way through the playlist and the next day it changed.

    • @RelativeSecurity
      @RelativeSecurity 8 месяцев назад

      @@randomness1o2 no worries, I was in the middle of sorting all videos, which may have impacted this list as well. I’ll list down all videos in the playlist here for you soon.

    • @randomness1o2
      @randomness1o2 8 месяцев назад

      Thank you sir.

  • @Batmanop17
    @Batmanop17 9 месяцев назад

    can you perfectly sort out your soc playlist ?

    • @RelativeSecurity
      @RelativeSecurity 9 месяцев назад

      Hello @Kaushalpurani5108, Thank you for the feedback. It has been sorted. Shall you need further help or assistance, feel free to comment :) Regards

    • @Batmanop17
      @Batmanop17 9 месяцев назад

      @@RelativeSecurity I want to do intership in soc so I started learning about soc so can you tell me which topics I should learn to get internship

    • @RelativeSecurity
      @RelativeSecurity 9 месяцев назад

      @@Batmanop17 email us at connect@relativesecurity.com

  • @divyansharya6615
    @divyansharya6615 9 месяцев назад

    Can we get the documents for study purpose ?

    • @RelativeSecurity
      @RelativeSecurity 9 месяцев назад

      I am working on it and will try to make them available as soon as possible.

  • @Pidamoussouma
    @Pidamoussouma 9 месяцев назад

    very good explanation

  • @AbkibarVishnuSarkar
    @AbkibarVishnuSarkar 9 месяцев назад

    Excellent Information

  • @islamdiab9483
    @islamdiab9483 10 месяцев назад

    I hope to continue, and explain more topics and examples. I am an ex-software engineer and now I will focusing on soc analysis. 🇪🇬

  • @RelativeSecurity
    @RelativeSecurity 10 месяцев назад

    What is a SIEM (Detailed Video) ruclips.net/video/V5XN2hd3BHM/видео.html

  • @ramanagudluru
    @ramanagudluru 10 месяцев назад

    Tnq so much for your video

  • @johnpavith
    @johnpavith 11 месяцев назад

    If IDS can only detect then who actions it after detection?

    • @RelativeSecurity
      @RelativeSecurity 11 месяцев назад

      It would be administrator/analyst who has access to these alerts. If these alerts are being forwarded to a SIEM solution, SOC analyst can take a necessary actions as well.

  • @Sarakness
    @Sarakness 11 месяцев назад

    Thank you!

  • @fisa6835
    @fisa6835 11 месяцев назад

    Do we still need epp if we already have edr?

    • @RelativeSecurity
      @RelativeSecurity 11 месяцев назад

      It depends on the requirements and policies of the organisation.

  • @rasikbhuimbar9831
    @rasikbhuimbar9831 11 месяцев назад

    Nice Video and Explanation Effort, I was zero in SIEM and was not finding perfect video which can explain SIEM on the higher level..One question I have, how IDS/IPS differ from SIEM then ?

    • @RelativeSecurity
      @RelativeSecurity 11 месяцев назад

      Thank you. IDS: Detects the malicious behaviour. IPS: Blocks the malicious behaviour. SIEM: Correlates the data from different log sources and generates the alert according to the detection rules in place.

  • @Aryan-ij3bx
    @Aryan-ij3bx 11 месяцев назад

    Plz upload more shorts videos regarding cyber attacks

  • @mohammedarshad8521
    @mohammedarshad8521 11 месяцев назад

    Can i get the soc analyst , edr vs siem notes. please

    • @RelativeSecurity
      @RelativeSecurity 11 месяцев назад

      What kind of notes are you expecting? Connect@relativesecurity.com

  • @shooshoo1416
    @shooshoo1416 Год назад

    Does it require knowledge of how to coding?

    • @RelativeSecurity
      @RelativeSecurity Год назад

      Generally, Knowledge of coding is always beneficial if working within IT, however you can do well without it in SOC.

  • @steventelfer8186
    @steventelfer8186 Год назад

    This is very helpful! Thank you sir

  • @tonyajit9202
    @tonyajit9202 Год назад

    Thank you sir very well explained ❤

  • @esmatsaidy
    @esmatsaidy Год назад

    Thumbs UP! Very good explanation.

  • @AswathyBabu-n5l
    @AswathyBabu-n5l Год назад

    very usefull video.Thank you

  • @emmanuelobileye5643
    @emmanuelobileye5643 Год назад

    The IP address you gave the OSSIM VM, was it a random IP address?

    • @RelativeSecurity
      @RelativeSecurity Год назад

      Yes you can give it any IP you want depending on how you configured your NIC in VM.

  • @yassersaied7279
    @yassersaied7279 Год назад

    Thanks for the details .. can we have a list that compares the differences of data that been collected from endpoints in EDR agent vs SIEM agent ? I wonder in modern SOC does we need to install 2 agents in each point-point (one for EDR and one for SIEM) or one agent and have EDR/SIEM as one server is the right approach ?

    • @RelativeSecurity
      @RelativeSecurity Год назад

      Lately siem agents have developed capability similar to EDR agents, however which one or both need to be installed will depend on organisational policy, security strategy and requirements.