![Relative Security](/img/default-banner.jpg)
- 208
- 347 333
Relative Security
United Kingdom
เข้าร่วมเมื่อ 5 ก.ค. 2009
At Relative Security, we're passionate about your digital safety and security. Our channel is dedicated to providing you with the latest insights, best practices, and expert advice to protect yourself and your organization in an increasingly complex digital landscape.
What You'll Find:
Educational Content: Dive deep into the world of cybersecurity with our comprehensive educational series. From cybersecurity fundamentals to advanced threat analysis, we've got you covered.
Career Advice: Please get in touch and we can offer you a suitable career advice depending on your past experience and expertise.
One-to-One Session: If you'd like to have a one-to-one session about any cyber security related query, interview preparation or trainings, feel free to email us at connect@relativesecurity.com
Stay Connected:
Don't forget to subscribe and hit that notification bell 🔔. Together, we'll build a safer and more secure digital future!
What You'll Find:
Educational Content: Dive deep into the world of cybersecurity with our comprehensive educational series. From cybersecurity fundamentals to advanced threat analysis, we've got you covered.
Career Advice: Please get in touch and we can offer you a suitable career advice depending on your past experience and expertise.
One-to-One Session: If you'd like to have a one-to-one session about any cyber security related query, interview preparation or trainings, feel free to email us at connect@relativesecurity.com
Stay Connected:
Don't forget to subscribe and hit that notification bell 🔔. Together, we'll build a safer and more secure digital future!
CIS Critical Security Controls - Network Monitoring Defense & Security Awareness & Training
CIS Critical Security Controls - Network Monitoring Defense & Security Awareness & Training
Welcome to our latest video on SANS CIS Critical Security Controls - Network Monitoring Defense & Security Awareness & Training! In this episode, we dive deep into critical security controls, focusing on network monitoring defense, and comprehensive security awareness and skills training. If you're involved in IT, cybersecurity, or enterprise risk management, this video is a must-watch.
In this video we discuss why these controls are critical and what are the activities involved in understanding and implementation of the Critical Security Controls. This video details the criticality of Network Monitoring Defense & Security Awareness & Training in an enterprise to improve the security posture of the organisation.
#cybersecurity #sans #criticalcontrols
Welcome to our latest video on SANS CIS Critical Security Controls - Network Monitoring Defense & Security Awareness & Training! In this episode, we dive deep into critical security controls, focusing on network monitoring defense, and comprehensive security awareness and skills training. If you're involved in IT, cybersecurity, or enterprise risk management, this video is a must-watch.
In this video we discuss why these controls are critical and what are the activities involved in understanding and implementation of the Critical Security Controls. This video details the criticality of Network Monitoring Defense & Security Awareness & Training in an enterprise to improve the security posture of the organisation.
#cybersecurity #sans #criticalcontrols
มุมมอง: 68
วีดีโอ
CIS Critical Security Controls - Incident Response Management & Penetration Testing
มุมมอง 27หลายเดือนก่อน
SANS CIS Critical Security Controls - Incident Response Management & Penetration Testing Welcome to our latest video on SANS CIS Critical Security Controls - Incident Response Management & Penetration Testing! In this episode, we dive deep into critical security controls, focusing on incident response management , and penetration testing. If you're involved in IT, cybersecurity, or enterprise r...
CIS Critical Security Controls - Data Recovery & Network Infrastructure Management
มุมมอง 532 หลายเดือนก่อน
CIS Critical Security Controls - Data Recovery & Network Infrastructure Management Welcome to our latest video on CIS Critical Security Controls - Data Recovery & Network Infrastructure Management! In this episode, we dive deep into critical security controls, focusing on data recovery and network infrastructure management. If you're involved in IT, cybersecurity, or enterprise risk management,...
CIS Critical Security Controls - Audit Log, Email & Web Protection, Malware Defense
มุมมอง 182 หลายเดือนก่อน
CIS Critical Security Controls - Audit Log, Email & Web Protection, Malware Defense Welcome to our latest video on SANS CIS Critical Security Controls - Audit Log, Email & Web Protection, Malware Defense! In this episode, we dive deep into critical security controls, focusing on Audit Log, Email & Web Protection, Malware Defense. If you're involved in IT, cybersecurity, or enterprise risk manag...
CIS Critical Security Controls - Access Controls and Vulnerability Management
มุมมอง 282 หลายเดือนก่อน
CIS Critical Security Controls - Access Controls and Vulnerability Management In this informative video, we delve into two critical components of enterprise security: Access Controls and Vulnerability Management. Welcome to our latest video on CIS Critical Security Controls - Access Controls and Vulnerability Management! In this episode, we dive deep into critical security controls, focusing on...
CIS Critical Security Controls - Inventory of Software Assets and Data Protection
มุมมอง 512 หลายเดือนก่อน
CIS Critical Security Controls - Inventory of Software Assets and Data Protection Welcome to our latest video on CIS Critical Security Controls - Inventory of Software Assets and Data Protection! In this episode, we dive deep into critical security controls, focusing on Inventory of Software Assets and Data Protection. If you're involved in IT, cybersecurity, or enterprise risk management, this...
CIS Critical Security Controls - Secure Configuration and Account Management
มุมมอง 322 หลายเดือนก่อน
CIS Critical Security Controls - Secure Configuration and Account Management Welcome to our latest video on CIS Critical Security Controls - Secure Configuration and Account Management! In this episode, we dive deep into critical security controls, focusing on Secure Configuration and Account Management. If you're involved in IT, cybersecurity, or enterprise risk management, this video is a mus...
CIS Critical Security Controls - Introduction and Inventory of enterprise assets
มุมมอง 1062 หลายเดือนก่อน
CIS Critical Security Controls - Introduction and Inventory of enterprise assets Welcome to our latest video on CIS Critical Security Controls - Introduction and Inventory of enterprise assets! In this episode, we dive deep into critical security controls, focusing on Introduction and Inventory of enterprise assets. If you're involved in IT, cybersecurity, or enterprise risk management, this vi...
Security Operations Center - Incident Response: Eradication, Recovery and Lessons Learnt Explained
มุมมอง 1293 หลายเดือนก่อน
Explore the intricacies of Incident Response with this comprehensive breakdown of the Eradication, Recovery, and Lessons Learned phases. From neutralizing threats to restoring normal operations and gleaning invaluable insights for future resilience, this video offers a deep dive into each crucial stage of incident resolution. Gain a nuanced understanding of how organizations navigate post-incid...
Security Operations Center - Understanding Incident Response: Identification Phase Explained
มุมมอง 1313 หลายเดือนก่อน
In this video, we delve into the crucial phase of Incident Response: Identification. Discover the key steps and strategies involved in identifying security incidents within an organization's infrastructure. From recognizing early signs to determining the scope and impact of an incident, learn how incident responders leverage various techniques and tools to detect and categorize security threats...
Security Operations Center - Understanding Incident Response: Preparation Phase Explained
มุมมอง 1623 หลายเดือนก่อน
🔒 Incident Response Preparation Phase Explained! 🚨 In this video, we delve into the crucial steps organizations take to fortify their cybersecurity defenses during the Preparation Stage of Incident Response. Discover how dedicated incident response teams are assembled and trained, the importance of clear policies and procedures, and the tools utilized for threat detection and analysis. Learn ab...
Demystifying Zero Trust: Building a Secure Future for Your Digital Landscape"
มุมมอง 963 หลายเดือนก่อน
In this comprehensive guide, we unravel the concept of Zero Trust and explore how it revolutionizes cybersecurity strategies. 🛡️ Discover the principles, benefits, and key components of Zero Trust architecture as we break down complex security paradigms into actionable insights. Whether you're an IT professional, business owner, or simply curious about the future of digital security, join us on...
Security Operations Center - What is SIEM
มุมมอง 9533 หลายเดือนก่อน
Security Operations Center - What is SIEM #WhatisSIEM #SecurityInformationAndEventManagement #CyberSecurity #informationsecurity In this video, we will be focusing on one of the crucial cybersecurity tools known as SIEM, or Security Information and Event Management.. So, in this video on SIEM, we will try to understand this technology in a very simplified manner and we will also see the princip...
Security Operations Center - Introduction to Incident Handling in Cyber Security
มุมมอง 2143 หลายเดือนก่อน
Welcome to our channel! 🚀 In this video, we're diving deep into the world of Incident Response - a crucial aspect of cybersecurity. Whether you're a seasoned professional or just starting your journey in cybersecurity, this Introduction to Incident Response is tailored for you. 🔍 What's covered: - Understanding the basics of Incident Response. - Key phases in the incident handling process. - Es...
SOC Security Operations Center - SOC as a Service - SOC Roles and Responsibilities - Ep06
มุมมอง 5753 หลายเดือนก่อน
SOC Security Operations Center - SOC as a Service - SOC Roles and Responsibilities - Ep06 Unlock the mysteries of SOC Security Operations Center - SOC as a Service - SOC Roles and Responsibilities with our latest TH-cam video! 🚀 Dive into the dynamic world of cybersecurity as we break down the crucial tasks and functions of SOC professionals. 🛡️ Whether you're a cybersecurity enthusiast, aspiri...
What is Cyber Essentials? A guide for small business security..
มุมมอง 1864 หลายเดือนก่อน
What is Cyber Essentials? A guide for small business security..
What is Operational Security? Why is it Important?
มุมมอง 3954 หลายเดือนก่อน
What is Operational Security? Why is it Important?
CS101 Introduction to Computer Programming - EP25 - Strings Lecture - Urdu/Hindi
มุมมอง 367 หลายเดือนก่อน
CS101 Introduction to Computer Programming - EP25 - Strings Lecture - Urdu/Hindi
CS101 Introduction to Computer Programming - EP24 - Pointers & Functions Lecture - Urdu/Hindi
มุมมอง 147 หลายเดือนก่อน
CS101 Introduction to Computer Programming - EP24 - Pointers & Functions Lecture - Urdu/Hindi
CS101 Introduction to Computer Programming - EP23 - Pointers & Arrays Lecture - Urdu/Hindi
มุมมอง 117 หลายเดือนก่อน
CS101 Introduction to Computer Programming - EP23 - Pointers & Arrays Lecture - Urdu/Hindi
CS101 Introduction to Computer Programming - EP22 - Pointers Revision Lecture - Urdu/Hindi
มุมมอง 137 หลายเดือนก่อน
CS101 Introduction to Computer Programming - EP22 - Pointers Revision Lecture - Urdu/Hindi
CS101 Introduction to Computer Programming - EP21 - Pointers Lecture - Urdu/Hindi
มุมมอง 238 หลายเดือนก่อน
CS101 Introduction to Computer Programming - EP21 - Pointers Lecture - Urdu/Hindi
CS101 Introduction to Computer Programming - EP20 - Multi Dimensional Arrays Example 2 - Urdu/Hindi
มุมมอง 88 หลายเดือนก่อน
CS101 Introduction to Computer Programming - EP20 - Multi Dimensional Arrays Example 2 - Urdu/Hindi
CS101 Introduction to Computer Programming - EP19 - Multi Dimensional Arrays Example 1 - Urdu/Hindi
มุมมอง 138 หลายเดือนก่อน
CS101 Introduction to Computer Programming - EP19 - Multi Dimensional Arrays Example 1 - Urdu/Hindi
CS101 Introduction to Computer Programming - EP18 - Multi Dimensional Arrays Lecture - Urdu/Hindi
มุมมอง 158 หลายเดือนก่อน
CS101 Introduction to Computer Programming - EP18 - Multi Dimensional Arrays Lecture - Urdu/Hindi
CS101 Introduction to Computer Programming - EP17 - Single Arrays Example - Urdu/Hindi
มุมมอง 98 หลายเดือนก่อน
CS101 Introduction to Computer Programming - EP17 - Single Arrays Example - Urdu/Hindi
CS101 Introduction to Computer Programming - EP16 - Single Arrays Lecture - Urdu/Hindi
มุมมอง 138 หลายเดือนก่อน
CS101 Introduction to Computer Programming - EP16 - Single Arrays Lecture - Urdu/Hindi
CS101 Introduction to Computer Programming - EP11 - Switch Case - Urdu/Hindi
มุมมอง 448 หลายเดือนก่อน
CS101 Introduction to Computer Programming - EP11 - Switch Case - Urdu/Hindi
Wow excellent. Very well explained.
Glad it was helpful!
Woah extremely well delivered ! very clear, concise
@josengoran8345 Glad you think so! Please consider to subscribe and like the videos :)
Would be great to have a video on SOAR architecture, similar to SIEM video. Thanks!
can you do a new vlog on SIEM based on latest processes and technologies, how can we apply AI etc
*promosm* 🤷
beautifully explained, clear and to the point. thank you!
Glad it was helpful!
Superb summary on siem. It has been amazing learning from this video.
Glad it was helpful!
Hello sir, first of all. You are an awesome teacher. But why did you remove SIEM from this playlist?. Please sir share some info.
Thank you. Just wanted to keep SOC beginner videos in one playlist. Even though SIEM video you are referring to is a great resource, however I am planning to create a separate playlist for it, or I’ll rename it and make that a permanent part of this play list. What do you suggest? Thank you for your comments, I am glad it was helpful for you.
Sir, your explanation is top notch. The playlist as it was ago, one senior at my work place referred that playlist to me. I was half way through the playlist and the next day it changed.
@@randomness1o2 no worries, I was in the middle of sorting all videos, which may have impacted this list as well. I’ll list down all videos in the playlist here for you soon.
Thank you sir.
can you perfectly sort out your soc playlist ?
Hello @Kaushalpurani5108, Thank you for the feedback. It has been sorted. Shall you need further help or assistance, feel free to comment :) Regards
@@RelativeSecurity I want to do intership in soc so I started learning about soc so can you tell me which topics I should learn to get internship
@@Batmanop17 email us at connect@relativesecurity.com
Can we get the documents for study purpose ?
I am working on it and will try to make them available as soon as possible.
very good explanation
Thanks for liking
Excellent Information
Glad it was helpful!
I hope to continue, and explain more topics and examples. I am an ex-software engineer and now I will focusing on soc analysis. 🇪🇬
I am glad these are helpful for you.
What is a SIEM (Detailed Video) th-cam.com/video/V5XN2hd3BHM/w-d-xo.html
Tnq so much for your video
Most welcome
If IDS can only detect then who actions it after detection?
It would be administrator/analyst who has access to these alerts. If these alerts are being forwarded to a SIEM solution, SOC analyst can take a necessary actions as well.
Thank you!
You're welcome!
So if I have xdr, I don’t need ids/ips?
It depends on the requirements and policies of the organisation.
Do we still need epp if we already have edr?
It depends on the requirements and policies of the organisation.
Nice Video and Explanation Effort, I was zero in SIEM and was not finding perfect video which can explain SIEM on the higher level..One question I have, how IDS/IPS differ from SIEM then ?
Thank you. IDS: Detects the malicious behaviour. IPS: Blocks the malicious behaviour. SIEM: Correlates the data from different log sources and generates the alert according to the detection rules in place.
Plz upload more shorts videos regarding cyber attacks
Thanks. Coming soon :)
Can i get the soc analyst , edr vs siem notes. please
What kind of notes are you expecting? Connect@relativesecurity.com
Does it require knowledge of how to coding?
Generally, Knowledge of coding is always beneficial if working within IT, however you can do well without it in SOC.
This is very helpful! Thank you sir
Thank you sir very well explained ❤
Most welcome
Thumbs UP! Very good explanation.
Glad it was helpful!
very usefull video.Thank you
The IP address you gave the OSSIM VM, was it a random IP address?
Yes you can give it any IP you want depending on how you configured your NIC in VM.
Thanks for the details .. can we have a list that compares the differences of data that been collected from endpoints in EDR agent vs SIEM agent ? I wonder in modern SOC does we need to install 2 agents in each point-point (one for EDR and one for SIEM) or one agent and have EDR/SIEM as one server is the right approach ?
Lately siem agents have developed capability similar to EDR agents, however which one or both need to be installed will depend on organisational policy, security strategy and requirements.
Hii sir ..i have tried ping and also face the host unreachable issue ..but you set a custom network which would i select...i am using Virtual box ..please address the issue
For a VM a custom network is needed, any specific error you are getting?
@@RelativeSecurity how can i create a custom one?
This should be done in the network settings of the VM. Not sure if I covered this in the video.
Very well explained
audio is undermodulated
Hello sir Thank you for your reply; Is it possible to have some standard processes that a SoC must for its operation. I'm in an organization, but where it doesn't have a process, I want to get an idea about the processes that a SoC should have Thanking you in advance
Please email: connect(@)relativesecurity.com
Hello Monsieur, Thank you for the video, it's really rechinsing and will help the soc analysts a lot. However, do you have any other processes that will help us? Thank you for your reply.
Hi @Abdel what kind of processes are you looking for? They can depend on organisational requirements.
Hey bro, I have a question.. Can you give me the sources that you have used in this video like what websites you used to create this video and understand qatars strategy that would be really helpful.
👍
Good definition
Thank you for this! Very helpful!
This is awesome, finally got the whole thing in one video. Is it valid for current Windows 10/11, Server 2019/22 also ? Or have things changed ?
Nice
Thanks
Under rated video! Thank you ❤
Acha jab binary mai hum subtract karain gy to .....carry lay k 10 bna....us mai sy jab 1 minus kia to 1 kaisay bacha...is subtraction ki smj nk aiii
Kiun k, 10 binary, 2 decimal k equal hai. 1 binary 1 decimal k equal hai, 2-1=1 is equal to 10-1=1 in binary Good?
@@RelativeSecurity okayy yess🤝🏻
3 aur 4 ki binary mai value 3 digits wly sy kiu li .......mtlb kisi sy b lay skty...double waly sy b lay skty ya 3 digits sy hi laini iski smj ni ai.
3 kee binary value: 0011 hai, 4 kee binary value: 0100 hai Digits sai farq nhn paraiy ga, bas us kee sahee binary value use karain Agar clear nhn to phir batain, aik session rakh lain gaiye.
@@RelativeSecurity hmm smj a gai ..... mtlb agar hum 3 ki value 0011 lain ya 011 lain value same hi aye gi....yehi baat hai na?
Yes, aap 0011 and 011 ko decimal main convert kar k aap verify kar lain.
Thank you so much for this video. So many other videos on SIEM are only about 5 minutes long. This is the perfect amount of depth for a beginner to start their own research.
Glad it was helpful!
Great
👍🏻👍🏻👍🏻
so if theres a quarantined file it wont effect my pc?
Yes it shouldn’t
👍thanks for excellent presentation Can you pls do on IBM Qradar tool?
Yes, sure