- Видео 212
- Просмотров 431 654
Relative Security
Великобритания
Добавлен 5 июл 2009
At Relative Security, we're passionate about your digital safety and security. Our channel is dedicated to providing you with the latest insights, best practices, and expert advice to protect yourself and your organization in an increasingly complex digital landscape.
What You'll Find:
Educational Content: Dive deep into the world of cybersecurity with our comprehensive educational series. From cybersecurity fundamentals to advanced threat analysis, we've got you covered.
Career Advice: Please get in touch and we can offer you a suitable career advice depending on your past experience and expertise.
One-to-One Session: If you'd like to have a one-to-one session about any cyber security related query, interview preparation or trainings, feel free to email us at connect@relativesecurity.com
Stay Connected:
Don't forget to subscribe and hit that notification bell 🔔. Together, we'll build a safer and more secure digital future!
What You'll Find:
Educational Content: Dive deep into the world of cybersecurity with our comprehensive educational series. From cybersecurity fundamentals to advanced threat analysis, we've got you covered.
Career Advice: Please get in touch and we can offer you a suitable career advice depending on your past experience and expertise.
One-to-One Session: If you'd like to have a one-to-one session about any cyber security related query, interview preparation or trainings, feel free to email us at connect@relativesecurity.com
Stay Connected:
Don't forget to subscribe and hit that notification bell 🔔. Together, we'll build a safer and more secure digital future!
MITRE's SOC Strategy 0: Building a World-Class SOC from the Ground Up | 11 SOC Strategies Explained
Are you ready to elevate your Security Operations Center (SOC) to world-class status? In this video, we dive into SOC Strategy 0, the foundational approach outlined in MITRE's "11 Strategies for a World-Class SOC" guide. Discover how this strategy emphasizes the importance of clear mission objectives, team alignment, and a proactive mindset to strengthen your SOC's capabilities.
You'll learn:
The core principles of Strategy 0 and why it's essential for success.
How to define your SOC's mission and align it with organizational goals.
Practical steps to implement this strategy in your SOC operations.
Key takeaways to help you build a robust and effective SOC.
Whether you're a SOC manager, analyst...
You'll learn:
The core principles of Strategy 0 and why it's essential for success.
How to define your SOC's mission and align it with organizational goals.
Practical steps to implement this strategy in your SOC operations.
Key takeaways to help you build a robust and effective SOC.
Whether you're a SOC manager, analyst...
Просмотров: 35
Видео
Master the Basics of Cybersecurity | Perfect for Security+ and Beyond!
Просмотров 1,4 тыс.19 часов назад
Master the Basics of Cybersecurity | Perfect for Security and Beyond! In this video, we break down fundamental concepts that are essential for anyone preparing for the CompTIA Security certification or other cybersecurity exams. Whether you're just starting your cybersecurity journey or looking for a refresher, this video has you covered! 🚀 📚 Topics Covered: ✔️ What is Information vs. Data? ✔️ ...
Crowdstrike - BSOD - Issue & Remedy
Просмотров 4826 месяцев назад
CrowdStrike has identified and reverted a faulty update causing BSODs due to csagent.sys, impacting critical services. The issue, related to the Falcon Sensor product, is being addressed by their engineering teams. Learn more about the problem and its remedy. Resolution: "Boot Windows into Safe Mode or the Windows Recovery Environment "Navigate to the C:\Windows\System32\drivers\CrowdStrike dir...
What is SOAR (Security, Orchestration, Automation & Response)
Просмотров 1,5 тыс.6 месяцев назад
What is SOAR (Security, Orchestration, Automation & Response)? Want to know how to effectively respond to a security breach? It's crucial to have a solid strategy in place before an incident occurs. In this video, we discuss in detail, How SOAR can help you to efficiently respond to your threats. A SOAR system (Security, Orchestration, Automation & Response) is designed to help you do just that...
CIS Critical Security Controls - Network Monitoring Defense & Security Awareness & Training
Просмотров 1558 месяцев назад
CIS Critical Security Controls - Network Monitoring Defense & Security Awareness & Training Welcome to our latest video on SANS CIS Critical Security Controls - Network Monitoring Defense & Security Awareness & Training! In this episode, we dive deep into critical security controls, focusing on network monitoring defense, and comprehensive security awareness and skills training. If you're invol...
CIS Critical Security Controls - Incident Response Management & Penetration Testing
Просмотров 728 месяцев назад
SANS CIS Critical Security Controls - Incident Response Management & Penetration Testing Welcome to our latest video on SANS CIS Critical Security Controls - Incident Response Management & Penetration Testing! In this episode, we dive deep into critical security controls, focusing on incident response management , and penetration testing. If you're involved in IT, cybersecurity, or enterprise r...
CIS Critical Security Controls - Data Recovery & Network Infrastructure Management
Просмотров 1098 месяцев назад
CIS Critical Security Controls - Data Recovery & Network Infrastructure Management Welcome to our latest video on CIS Critical Security Controls - Data Recovery & Network Infrastructure Management! In this episode, we dive deep into critical security controls, focusing on data recovery and network infrastructure management. If you're involved in IT, cybersecurity, or enterprise risk management,...
CIS Critical Security Controls - Audit Log, Email & Web Protection, Malware Defense
Просмотров 698 месяцев назад
CIS Critical Security Controls - Audit Log, Email & Web Protection, Malware Defense Welcome to our latest video on SANS CIS Critical Security Controls - Audit Log, Email & Web Protection, Malware Defense! In this episode, we dive deep into critical security controls, focusing on Audit Log, Email & Web Protection, Malware Defense. If you're involved in IT, cybersecurity, or enterprise risk manag...
CIS Critical Security Controls - Access Controls and Vulnerability Management
Просмотров 1068 месяцев назад
CIS Critical Security Controls - Access Controls and Vulnerability Management In this informative video, we delve into two critical components of enterprise security: Access Controls and Vulnerability Management. Welcome to our latest video on CIS Critical Security Controls - Access Controls and Vulnerability Management! In this episode, we dive deep into critical security controls, focusing on...
CIS Critical Security Controls - Inventory of Software Assets and Data Protection
Просмотров 1529 месяцев назад
CIS Critical Security Controls - Inventory of Software Assets and Data Protection Welcome to our latest video on CIS Critical Security Controls - Inventory of Software Assets and Data Protection! In this episode, we dive deep into critical security controls, focusing on Inventory of Software Assets and Data Protection. If you're involved in IT, cybersecurity, or enterprise risk management, this...
CIS Critical Security Controls - Secure Configuration and Account Management
Просмотров 869 месяцев назад
CIS Critical Security Controls - Secure Configuration and Account Management Welcome to our latest video on CIS Critical Security Controls - Secure Configuration and Account Management! In this episode, we dive deep into critical security controls, focusing on Secure Configuration and Account Management. If you're involved in IT, cybersecurity, or enterprise risk management, this video is a mus...
CIS Critical Security Controls - Introduction and Inventory of enterprise assets
Просмотров 4899 месяцев назад
CIS Critical Security Controls - Introduction and Inventory of enterprise assets Welcome to our latest video on CIS Critical Security Controls - Introduction and Inventory of enterprise assets! In this episode, we dive deep into critical security controls, focusing on Introduction and Inventory of enterprise assets. If you're involved in IT, cybersecurity, or enterprise risk management, this vi...
Security Operations Center - Incident Response: Eradication, Recovery and Lessons Learnt Explained
Просмотров 19110 месяцев назад
Explore the intricacies of Incident Response with this comprehensive breakdown of the Eradication, Recovery, and Lessons Learned phases. From neutralizing threats to restoring normal operations and gleaning invaluable insights for future resilience, this video offers a deep dive into each crucial stage of incident resolution. Gain a nuanced understanding of how organizations navigate post-incid...
Security Operations Center - Understanding Incident Response: Identification Phase Explained
Просмотров 27210 месяцев назад
In this video, we delve into the crucial phase of Incident Response: Identification. Discover the key steps and strategies involved in identifying security incidents within an organization's infrastructure. From recognizing early signs to determining the scope and impact of an incident, learn how incident responders leverage various techniques and tools to detect and categorize security threats...
Security Operations Center - Understanding Incident Response: Preparation Phase Explained
Просмотров 31410 месяцев назад
🔒 Incident Response Preparation Phase Explained! 🚨 In this video, we delve into the crucial steps organizations take to fortify their cybersecurity defenses during the Preparation Stage of Incident Response. Discover how dedicated incident response teams are assembled and trained, the importance of clear policies and procedures, and the tools utilized for threat detection and analysis. Learn ab...
Demystifying Zero Trust: Building a Secure Future for Your Digital Landscape"
Просмотров 12510 месяцев назад
Demystifying Zero Trust: Building a Secure Future for Your Digital Landscape"
Security Operations Center - What is SIEM
Просмотров 2,5 тыс.10 месяцев назад
Security Operations Center - What is SIEM
Security Operations Center - Introduction to Incident Handling in Cyber Security
Просмотров 35610 месяцев назад
Security Operations Center - Introduction to Incident Handling in Cyber Security
SOC Security Operations Center - SOC as a Service - SOC Roles and Responsibilities - Ep06
Просмотров 1,1 тыс.10 месяцев назад
SOC Security Operations Center - SOC as a Service - SOC Roles and Responsibilities - Ep06
Fundamentals of Information Security
Просмотров 7010 месяцев назад
Fundamentals of Information Security
What is Cyber Essentials? A guide for small business security..
Просмотров 39311 месяцев назад
What is Cyber Essentials? A guide for small business security..
What is Operational Security? Why is it Important?
Просмотров 79911 месяцев назад
What is Operational Security? Why is it Important?
CS101 Introduction to Computer Programming - EP25 - Strings Lecture - Urdu/Hindi
Просмотров 44Год назад
CS101 Introduction to Computer Programming - EP25 - Strings Lecture - Urdu/Hindi
CS101 Introduction to Computer Programming - EP24 - Pointers & Functions Lecture - Urdu/Hindi
Просмотров 16Год назад
CS101 Introduction to Computer Programming - EP24 - Pointers & Functions Lecture - Urdu/Hindi
CS101 Introduction to Computer Programming - EP23 - Pointers & Arrays Lecture - Urdu/Hindi
Просмотров 12Год назад
CS101 Introduction to Computer Programming - EP23 - Pointers & Arrays Lecture - Urdu/Hindi
CS101 Introduction to Computer Programming - EP22 - Pointers Revision Lecture - Urdu/Hindi
Просмотров 15Год назад
CS101 Introduction to Computer Programming - EP22 - Pointers Revision Lecture - Urdu/Hindi
CS101 Introduction to Computer Programming - EP21 - Pointers Lecture - Urdu/Hindi
Просмотров 26Год назад
CS101 Introduction to Computer Programming - EP21 - Pointers Lecture - Urdu/Hindi
CS101 Introduction to Computer Programming - EP20 - Multi Dimensional Arrays Example 2 - Urdu/Hindi
Просмотров 9Год назад
CS101 Introduction to Computer Programming - EP20 - Multi Dimensional Arrays Example 2 - Urdu/Hindi
CS101 Introduction to Computer Programming - EP19 - Multi Dimensional Arrays Example 1 - Urdu/Hindi
Просмотров 13Год назад
CS101 Introduction to Computer Programming - EP19 - Multi Dimensional Arrays Example 1 - Urdu/Hindi
Watching this before an interview
Best of luck :) let us know how did it go.
perfectly explained thanks
Appreciate the feedback :)
One way authentication video
Hello, I have done all the process, but while starting the service, and checcking the logs, i am getting two warnings, no routes defined and not starting unused module in windows events, what should i do for that?
These errors seem to be due to incorrect configuration file. Make sure your configuration file is correct and has all the routes defined.
would love if there was a link that contains all the xml that you put in each file. you could use scp to send the files that was changed in master to the slaves. its a good way to verify ssh at the same time. the jumping between screens gave me headache, maybe add some edits and just jump to the clip where you actually made a change. good video either way. (y)
Thank you for the feedback. Appreciate it :) Regarding the xml files, I no longer have access to those files, but I’ll see if I can get the access then will add it here.
Thanks
Welcome
Very thanks for the great video
My pleasure!
Public key is encrypt or decrypt
Public key in itself can be encrypted or decrypted depending on the context where it is being used.
This was really helpful. Do you have similar information about container security?
Glad it was helpful. Not yet but very soon
Is there any one who can build SIEM project for me in paid
Email @ connect@relativesecurity.com your requirements.
Excellent info
Glad it was helpful!
Very well explained.. Thank you.... Please explain in details the vendors too
Okay sure
I can't exactly understand difference between nids and hids please explain more details
Can you elaborate what is the confusion?
Please make videos on all security products
thank you
Very clear and understandable. Thank you very much!
Glad it was helpful!
Great video on Cyber Threat Intelligence! How can businesses effectively implement these practices daily?
Malayali?
Nope :)
I really like the way you explain things, thank you very much for your videos
Glad you like them!
This fix is not authentic yet, did it work for anyone?
So far it is the correct resolution. You can follow this link for automatic remediation script gist.github.com/whichbuffer/7830c73711589dcf9e7a5217797ca617
This is the information we need. Thank you for this channel. Btw one question. What program are you using to see those logs? Or can this be seen with command on a terminal.
Appreciate it. You can use baretail log viewer or simple notepad++ does the trick.
Wow excellent. Very well explained.
Glad it was helpful!
Woah extremely well delivered ! very clear, concise
@josengoran8345 Glad you think so! Please consider to subscribe and like the videos :)
Would be great to have a video on SOAR architecture, similar to SIEM video. Thanks!
ruclips.net/video/4elHo14GNJE/видео.html. :)
can you do a new vlog on SIEM based on latest processes and technologies, how can we apply AI etc
*promosm* 🤷
beautifully explained, clear and to the point. thank you!
Glad it was helpful!
Superb summary on siem. It has been amazing learning from this video.
Glad it was helpful!
Hello sir, first of all. You are an awesome teacher. But why did you remove SIEM from this playlist?. Please sir share some info.
Thank you. Just wanted to keep SOC beginner videos in one playlist. Even though SIEM video you are referring to is a great resource, however I am planning to create a separate playlist for it, or I’ll rename it and make that a permanent part of this play list. What do you suggest? Thank you for your comments, I am glad it was helpful for you.
Sir, your explanation is top notch. The playlist as it was ago, one senior at my work place referred that playlist to me. I was half way through the playlist and the next day it changed.
@@randomness1o2 no worries, I was in the middle of sorting all videos, which may have impacted this list as well. I’ll list down all videos in the playlist here for you soon.
Thank you sir.
can you perfectly sort out your soc playlist ?
Hello @Kaushalpurani5108, Thank you for the feedback. It has been sorted. Shall you need further help or assistance, feel free to comment :) Regards
@@RelativeSecurity I want to do intership in soc so I started learning about soc so can you tell me which topics I should learn to get internship
@@Batmanop17 email us at connect@relativesecurity.com
Can we get the documents for study purpose ?
I am working on it and will try to make them available as soon as possible.
very good explanation
Thanks for liking
Excellent Information
Glad it was helpful!
I hope to continue, and explain more topics and examples. I am an ex-software engineer and now I will focusing on soc analysis. 🇪🇬
I am glad these are helpful for you.
What is a SIEM (Detailed Video) ruclips.net/video/V5XN2hd3BHM/видео.html
Tnq so much for your video
Most welcome
If IDS can only detect then who actions it after detection?
It would be administrator/analyst who has access to these alerts. If these alerts are being forwarded to a SIEM solution, SOC analyst can take a necessary actions as well.
Thank you!
You're welcome!
Do we still need epp if we already have edr?
It depends on the requirements and policies of the organisation.
Nice Video and Explanation Effort, I was zero in SIEM and was not finding perfect video which can explain SIEM on the higher level..One question I have, how IDS/IPS differ from SIEM then ?
Thank you. IDS: Detects the malicious behaviour. IPS: Blocks the malicious behaviour. SIEM: Correlates the data from different log sources and generates the alert according to the detection rules in place.
Plz upload more shorts videos regarding cyber attacks
Thanks. Coming soon :)
Can i get the soc analyst , edr vs siem notes. please
What kind of notes are you expecting? Connect@relativesecurity.com
Does it require knowledge of how to coding?
Generally, Knowledge of coding is always beneficial if working within IT, however you can do well without it in SOC.
This is very helpful! Thank you sir
Thank you sir very well explained ❤
Most welcome
Thumbs UP! Very good explanation.
Glad it was helpful!
very usefull video.Thank you
The IP address you gave the OSSIM VM, was it a random IP address?
Yes you can give it any IP you want depending on how you configured your NIC in VM.
Thanks for the details .. can we have a list that compares the differences of data that been collected from endpoints in EDR agent vs SIEM agent ? I wonder in modern SOC does we need to install 2 agents in each point-point (one for EDR and one for SIEM) or one agent and have EDR/SIEM as one server is the right approach ?
Lately siem agents have developed capability similar to EDR agents, however which one or both need to be installed will depend on organisational policy, security strategy and requirements.