Category: Cyber Threat
Protocol Usage by Each Layer
Threat hunting with Nntwork protocol and understanding of network services used on each ISO/OSI Layer.
Account Transaction Use Cases
Project Name: Account Transaction Use Cases Description: – Account Transaction Use Cases are proved to be helpful in common UEBA scenarios… read out Account Transaction Use Cases
Threat Hunting with Firewall Traffic
Project Name: Threat Hunting with Firewall Traffic Description: – Whenever attackers are changing the routine procedure and evade defenses of enterprises,Cyber… read out Threat Hunting with Firewall Traffic
Threat Hunting Scenario
Threat Hunting Scenario are different hunt techniques that a threat hunter will follow. All hunting scenarios are based on the… read out Threat Hunting Scenario
Principal Components of Security Information Event Management
Principal Components of Security Information Event Management. Description: – Security Information and Event Management (SIEM) permits security team to get… read out Principal Components of Security Information Event Management