Relative Security
Relative Security
  • 208
  • 347 333
CIS Critical Security Controls - Network Monitoring Defense & Security Awareness & Training
CIS Critical Security Controls - Network Monitoring Defense & Security Awareness & Training
Welcome to our latest video on SANS CIS Critical Security Controls - Network Monitoring Defense & Security Awareness & Training! In this episode, we dive deep into critical security controls, focusing on network monitoring defense, and comprehensive security awareness and skills training. If you're involved in IT, cybersecurity, or enterprise risk management, this video is a must-watch.
In this video we discuss why these controls are critical and what are the activities involved in understanding and implementation of the Critical Security Controls. This video details the criticality of Network Monitoring Defense & Security Awareness & Training in an enterprise to improve the security posture of the organisation.
#cybersecurity #sans #criticalcontrols
มุมมอง: 68

วีดีโอ

CIS Critical Security Controls - Incident Response Management & Penetration Testing
มุมมอง 27หลายเดือนก่อน
SANS CIS Critical Security Controls - Incident Response Management & Penetration Testing Welcome to our latest video on SANS CIS Critical Security Controls - Incident Response Management & Penetration Testing! In this episode, we dive deep into critical security controls, focusing on incident response management , and penetration testing. If you're involved in IT, cybersecurity, or enterprise r...
CIS Critical Security Controls - Data Recovery & Network Infrastructure Management
มุมมอง 532 หลายเดือนก่อน
CIS Critical Security Controls - Data Recovery & Network Infrastructure Management Welcome to our latest video on CIS Critical Security Controls - Data Recovery & Network Infrastructure Management! In this episode, we dive deep into critical security controls, focusing on data recovery and network infrastructure management. If you're involved in IT, cybersecurity, or enterprise risk management,...
CIS Critical Security Controls - Audit Log, Email & Web Protection, Malware Defense
มุมมอง 182 หลายเดือนก่อน
CIS Critical Security Controls - Audit Log, Email & Web Protection, Malware Defense Welcome to our latest video on SANS CIS Critical Security Controls - Audit Log, Email & Web Protection, Malware Defense! In this episode, we dive deep into critical security controls, focusing on Audit Log, Email & Web Protection, Malware Defense. If you're involved in IT, cybersecurity, or enterprise risk manag...
CIS Critical Security Controls - Access Controls and Vulnerability Management
มุมมอง 282 หลายเดือนก่อน
CIS Critical Security Controls - Access Controls and Vulnerability Management In this informative video, we delve into two critical components of enterprise security: Access Controls and Vulnerability Management. Welcome to our latest video on CIS Critical Security Controls - Access Controls and Vulnerability Management! In this episode, we dive deep into critical security controls, focusing on...
CIS Critical Security Controls - Inventory of Software Assets and Data Protection
มุมมอง 512 หลายเดือนก่อน
CIS Critical Security Controls - Inventory of Software Assets and Data Protection Welcome to our latest video on CIS Critical Security Controls - Inventory of Software Assets and Data Protection! In this episode, we dive deep into critical security controls, focusing on Inventory of Software Assets and Data Protection. If you're involved in IT, cybersecurity, or enterprise risk management, this...
CIS Critical Security Controls - Secure Configuration and Account Management
มุมมอง 322 หลายเดือนก่อน
CIS Critical Security Controls - Secure Configuration and Account Management Welcome to our latest video on CIS Critical Security Controls - Secure Configuration and Account Management! In this episode, we dive deep into critical security controls, focusing on Secure Configuration and Account Management. If you're involved in IT, cybersecurity, or enterprise risk management, this video is a mus...
CIS Critical Security Controls - Introduction and Inventory of enterprise assets
มุมมอง 1062 หลายเดือนก่อน
CIS Critical Security Controls - Introduction and Inventory of enterprise assets Welcome to our latest video on CIS Critical Security Controls - Introduction and Inventory of enterprise assets! In this episode, we dive deep into critical security controls, focusing on Introduction and Inventory of enterprise assets. If you're involved in IT, cybersecurity, or enterprise risk management, this vi...
Security Operations Center - Incident Response: Eradication, Recovery and Lessons Learnt Explained
มุมมอง 1293 หลายเดือนก่อน
Explore the intricacies of Incident Response with this comprehensive breakdown of the Eradication, Recovery, and Lessons Learned phases. From neutralizing threats to restoring normal operations and gleaning invaluable insights for future resilience, this video offers a deep dive into each crucial stage of incident resolution. Gain a nuanced understanding of how organizations navigate post-incid...
Security Operations Center - Understanding Incident Response: Identification Phase Explained
มุมมอง 1313 หลายเดือนก่อน
In this video, we delve into the crucial phase of Incident Response: Identification. Discover the key steps and strategies involved in identifying security incidents within an organization's infrastructure. From recognizing early signs to determining the scope and impact of an incident, learn how incident responders leverage various techniques and tools to detect and categorize security threats...
Security Operations Center - Understanding Incident Response: Preparation Phase Explained
มุมมอง 1623 หลายเดือนก่อน
🔒 Incident Response Preparation Phase Explained! 🚨 In this video, we delve into the crucial steps organizations take to fortify their cybersecurity defenses during the Preparation Stage of Incident Response. Discover how dedicated incident response teams are assembled and trained, the importance of clear policies and procedures, and the tools utilized for threat detection and analysis. Learn ab...
Demystifying Zero Trust: Building a Secure Future for Your Digital Landscape"
มุมมอง 963 หลายเดือนก่อน
In this comprehensive guide, we unravel the concept of Zero Trust and explore how it revolutionizes cybersecurity strategies. 🛡️ Discover the principles, benefits, and key components of Zero Trust architecture as we break down complex security paradigms into actionable insights. Whether you're an IT professional, business owner, or simply curious about the future of digital security, join us on...
Security Operations Center - What is SIEM
มุมมอง 9533 หลายเดือนก่อน
Security Operations Center - What is SIEM #WhatisSIEM #SecurityInformationAndEventManagement #CyberSecurity #informationsecurity In this video, we will be focusing on one of the crucial cybersecurity tools known as SIEM, or Security Information and Event Management.. So, in this video on SIEM, we will try to understand this technology in a very simplified manner and we will also see the princip...
Security Operations Center - Introduction to Incident Handling in Cyber Security
มุมมอง 2143 หลายเดือนก่อน
Welcome to our channel! 🚀 In this video, we're diving deep into the world of Incident Response - a crucial aspect of cybersecurity. Whether you're a seasoned professional or just starting your journey in cybersecurity, this Introduction to Incident Response is tailored for you. 🔍 What's covered: - Understanding the basics of Incident Response. - Key phases in the incident handling process. - Es...
SOC Security Operations Center - SOC as a Service - SOC Roles and Responsibilities - Ep06
มุมมอง 5753 หลายเดือนก่อน
SOC Security Operations Center - SOC as a Service - SOC Roles and Responsibilities - Ep06 Unlock the mysteries of SOC Security Operations Center - SOC as a Service - SOC Roles and Responsibilities with our latest TH-cam video! 🚀 Dive into the dynamic world of cybersecurity as we break down the crucial tasks and functions of SOC professionals. 🛡️ Whether you're a cybersecurity enthusiast, aspiri...
Fundamentals of Information Security
มุมมอง 433 หลายเดือนก่อน
Fundamentals of Information Security
What is Information Security?
มุมมอง 1364 หลายเดือนก่อน
What is Information Security?
What is Cyber Essentials? A guide for small business security..
มุมมอง 1864 หลายเดือนก่อน
What is Cyber Essentials? A guide for small business security..
What is Operational Security? Why is it Important?
มุมมอง 3954 หลายเดือนก่อน
What is Operational Security? Why is it Important?
CS101 Introduction to Computer Programming - EP25 - Strings Lecture - Urdu/Hindi
มุมมอง 367 หลายเดือนก่อน
CS101 Introduction to Computer Programming - EP25 - Strings Lecture - Urdu/Hindi
CS101 Introduction to Computer Programming - EP24 - Pointers & Functions Lecture - Urdu/Hindi
มุมมอง 147 หลายเดือนก่อน
CS101 Introduction to Computer Programming - EP24 - Pointers & Functions Lecture - Urdu/Hindi
CS101 Introduction to Computer Programming - EP23 - Pointers & Arrays Lecture - Urdu/Hindi
มุมมอง 117 หลายเดือนก่อน
CS101 Introduction to Computer Programming - EP23 - Pointers & Arrays Lecture - Urdu/Hindi
CS101 Introduction to Computer Programming - EP22 - Pointers Revision Lecture - Urdu/Hindi
มุมมอง 137 หลายเดือนก่อน
CS101 Introduction to Computer Programming - EP22 - Pointers Revision Lecture - Urdu/Hindi
CS101 Introduction to Computer Programming - EP21 - Pointers Lecture - Urdu/Hindi
มุมมอง 238 หลายเดือนก่อน
CS101 Introduction to Computer Programming - EP21 - Pointers Lecture - Urdu/Hindi
CS101 Introduction to Computer Programming - EP20 - Multi Dimensional Arrays Example 2 - Urdu/Hindi
มุมมอง 88 หลายเดือนก่อน
CS101 Introduction to Computer Programming - EP20 - Multi Dimensional Arrays Example 2 - Urdu/Hindi
CS101 Introduction to Computer Programming - EP19 - Multi Dimensional Arrays Example 1 - Urdu/Hindi
มุมมอง 138 หลายเดือนก่อน
CS101 Introduction to Computer Programming - EP19 - Multi Dimensional Arrays Example 1 - Urdu/Hindi
CS101 Introduction to Computer Programming - EP18 - Multi Dimensional Arrays Lecture - Urdu/Hindi
มุมมอง 158 หลายเดือนก่อน
CS101 Introduction to Computer Programming - EP18 - Multi Dimensional Arrays Lecture - Urdu/Hindi
CS101 Introduction to Computer Programming - EP17 - Single Arrays Example - Urdu/Hindi
มุมมอง 98 หลายเดือนก่อน
CS101 Introduction to Computer Programming - EP17 - Single Arrays Example - Urdu/Hindi
CS101 Introduction to Computer Programming - EP16 - Single Arrays Lecture - Urdu/Hindi
มุมมอง 138 หลายเดือนก่อน
CS101 Introduction to Computer Programming - EP16 - Single Arrays Lecture - Urdu/Hindi
CS101 Introduction to Computer Programming - EP11 - Switch Case - Urdu/Hindi
มุมมอง 448 หลายเดือนก่อน
CS101 Introduction to Computer Programming - EP11 - Switch Case - Urdu/Hindi

ความคิดเห็น

  • @user-zr5ts2qd4h
    @user-zr5ts2qd4h 25 วันที่ผ่านมา

    Wow excellent. Very well explained.

  • @josengoran8345
    @josengoran8345 หลายเดือนก่อน

    Woah extremely well delivered ! very clear, concise

    • @RelativeSecurity
      @RelativeSecurity หลายเดือนก่อน

      @josengoran8345 Glad you think so! Please consider to subscribe and like the videos :)

  • @tuannguyenanh175
    @tuannguyenanh175 หลายเดือนก่อน

    Would be great to have a video on SOAR architecture, similar to SIEM video. Thanks!

  • @Lima3578user
    @Lima3578user หลายเดือนก่อน

    can you do a new vlog on SIEM based on latest processes and technologies, how can we apply AI etc

  • @wellsolivieri7766
    @wellsolivieri7766 หลายเดือนก่อน

    *promosm* 🤷

  • @blueshadow3794
    @blueshadow3794 หลายเดือนก่อน

    beautifully explained, clear and to the point. thank you!

  • @dr.moizaabid7370
    @dr.moizaabid7370 หลายเดือนก่อน

    Superb summary on siem. It has been amazing learning from this video.

  • @randomness1o2
    @randomness1o2 2 หลายเดือนก่อน

    Hello sir, first of all. You are an awesome teacher. But why did you remove SIEM from this playlist?. Please sir share some info.

    • @RelativeSecurity
      @RelativeSecurity 2 หลายเดือนก่อน

      Thank you. Just wanted to keep SOC beginner videos in one playlist. Even though SIEM video you are referring to is a great resource, however I am planning to create a separate playlist for it, or I’ll rename it and make that a permanent part of this play list. What do you suggest? Thank you for your comments, I am glad it was helpful for you.

    • @randomness1o2
      @randomness1o2 หลายเดือนก่อน

      Sir, your explanation is top notch. The playlist as it was ago, one senior at my work place referred that playlist to me. I was half way through the playlist and the next day it changed.

    • @RelativeSecurity
      @RelativeSecurity หลายเดือนก่อน

      @@randomness1o2 no worries, I was in the middle of sorting all videos, which may have impacted this list as well. I’ll list down all videos in the playlist here for you soon.

    • @randomness1o2
      @randomness1o2 หลายเดือนก่อน

      Thank you sir.

  • @Batmanop17
    @Batmanop17 2 หลายเดือนก่อน

    can you perfectly sort out your soc playlist ?

    • @RelativeSecurity
      @RelativeSecurity 2 หลายเดือนก่อน

      Hello @Kaushalpurani5108, Thank you for the feedback. It has been sorted. Shall you need further help or assistance, feel free to comment :) Regards

    • @Batmanop17
      @Batmanop17 2 หลายเดือนก่อน

      @@RelativeSecurity I want to do intership in soc so I started learning about soc so can you tell me which topics I should learn to get internship

    • @RelativeSecurity
      @RelativeSecurity 2 หลายเดือนก่อน

      @@Batmanop17 email us at connect@relativesecurity.com

  • @divyansharya6615
    @divyansharya6615 2 หลายเดือนก่อน

    Can we get the documents for study purpose ?

    • @RelativeSecurity
      @RelativeSecurity 2 หลายเดือนก่อน

      I am working on it and will try to make them available as soon as possible.

  • @Pidamoussouma
    @Pidamoussouma 2 หลายเดือนก่อน

    very good explanation

  • @AbkibarVishnuSarkar
    @AbkibarVishnuSarkar 3 หลายเดือนก่อน

    Excellent Information

  • @islamdiab9483
    @islamdiab9483 3 หลายเดือนก่อน

    I hope to continue, and explain more topics and examples. I am an ex-software engineer and now I will focusing on soc analysis. 🇪🇬

    • @RelativeSecurity
      @RelativeSecurity 3 หลายเดือนก่อน

      I am glad these are helpful for you.

  • @RelativeSecurity
    @RelativeSecurity 3 หลายเดือนก่อน

    What is a SIEM (Detailed Video) th-cam.com/video/V5XN2hd3BHM/w-d-xo.html

  • @ramanagudluru
    @ramanagudluru 3 หลายเดือนก่อน

    Tnq so much for your video

  • @johnpavith
    @johnpavith 4 หลายเดือนก่อน

    If IDS can only detect then who actions it after detection?

    • @RelativeSecurity
      @RelativeSecurity 4 หลายเดือนก่อน

      It would be administrator/analyst who has access to these alerts. If these alerts are being forwarded to a SIEM solution, SOC analyst can take a necessary actions as well.

  • @Sarakness
    @Sarakness 4 หลายเดือนก่อน

    Thank you!

  • @robyee3325
    @robyee3325 4 หลายเดือนก่อน

    So if I have xdr, I don’t need ids/ips?

    • @RelativeSecurity
      @RelativeSecurity 4 หลายเดือนก่อน

      It depends on the requirements and policies of the organisation.

  • @fisa6835
    @fisa6835 4 หลายเดือนก่อน

    Do we still need epp if we already have edr?

    • @RelativeSecurity
      @RelativeSecurity 4 หลายเดือนก่อน

      It depends on the requirements and policies of the organisation.

  • @rasikbhuimbar9831
    @rasikbhuimbar9831 4 หลายเดือนก่อน

    Nice Video and Explanation Effort, I was zero in SIEM and was not finding perfect video which can explain SIEM on the higher level..One question I have, how IDS/IPS differ from SIEM then ?

    • @RelativeSecurity
      @RelativeSecurity 4 หลายเดือนก่อน

      Thank you. IDS: Detects the malicious behaviour. IPS: Blocks the malicious behaviour. SIEM: Correlates the data from different log sources and generates the alert according to the detection rules in place.

  • @Aryan-ij3bx
    @Aryan-ij3bx 4 หลายเดือนก่อน

    Plz upload more shorts videos regarding cyber attacks

  • @mohammedarshad8521
    @mohammedarshad8521 4 หลายเดือนก่อน

    Can i get the soc analyst , edr vs siem notes. please

    • @RelativeSecurity
      @RelativeSecurity 4 หลายเดือนก่อน

      What kind of notes are you expecting? Connect@relativesecurity.com

  • @shooshoo1416
    @shooshoo1416 5 หลายเดือนก่อน

    Does it require knowledge of how to coding?

    • @RelativeSecurity
      @RelativeSecurity 5 หลายเดือนก่อน

      Generally, Knowledge of coding is always beneficial if working within IT, however you can do well without it in SOC.

  • @steventelfer8186
    @steventelfer8186 5 หลายเดือนก่อน

    This is very helpful! Thank you sir

  • @tonyajit9202
    @tonyajit9202 6 หลายเดือนก่อน

    Thank you sir very well explained ❤

  • @esmatullahsaidy4037
    @esmatullahsaidy4037 6 หลายเดือนก่อน

    Thumbs UP! Very good explanation.

  • @user-go3ht9rw1f
    @user-go3ht9rw1f 6 หลายเดือนก่อน

    very usefull video.Thank you

  • @emmanuelobileye5643
    @emmanuelobileye5643 7 หลายเดือนก่อน

    The IP address you gave the OSSIM VM, was it a random IP address?

    • @RelativeSecurity
      @RelativeSecurity 6 หลายเดือนก่อน

      Yes you can give it any IP you want depending on how you configured your NIC in VM.

  • @yassersaied7279
    @yassersaied7279 7 หลายเดือนก่อน

    Thanks for the details .. can we have a list that compares the differences of data that been collected from endpoints in EDR agent vs SIEM agent ? I wonder in modern SOC does we need to install 2 agents in each point-point (one for EDR and one for SIEM) or one agent and have EDR/SIEM as one server is the right approach ?

    • @RelativeSecurity
      @RelativeSecurity 7 หลายเดือนก่อน

      Lately siem agents have developed capability similar to EDR agents, however which one or both need to be installed will depend on organisational policy, security strategy and requirements.

  • @muneebabashir1220
    @muneebabashir1220 7 หลายเดือนก่อน

    Hii sir ..i have tried ping and also face the host unreachable issue ..but you set a custom network which would i select...i am using Virtual box ..please address the issue

    • @RelativeSecurity
      @RelativeSecurity 7 หลายเดือนก่อน

      For a VM a custom network is needed, any specific error you are getting?

    • @muneebabashir1220
      @muneebabashir1220 7 หลายเดือนก่อน

      @@RelativeSecurity how can i create a custom one?

    • @RelativeSecurity
      @RelativeSecurity 6 หลายเดือนก่อน

      This should be done in the network settings of the VM. Not sure if I covered this in the video.

  • @manojpetshali3240
    @manojpetshali3240 7 หลายเดือนก่อน

    Very well explained

  • @ejdadj69
    @ejdadj69 7 หลายเดือนก่อน

    audio is undermodulated

  • @user-xc5vj1hb6w
    @user-xc5vj1hb6w 7 หลายเดือนก่อน

    Hello sir Thank you for your reply; Is it possible to have some standard processes that a SoC must for its operation. I'm in an organization, but where it doesn't have a process, I want to get an idea about the processes that a SoC should have Thanking you in advance

    • @RelativeSecurity
      @RelativeSecurity 7 หลายเดือนก่อน

      Please email: connect(@)relativesecurity.com

  • @user-xc5vj1hb6w
    @user-xc5vj1hb6w 8 หลายเดือนก่อน

    Hello Monsieur, Thank you for the video, it's really rechinsing and will help the soc analysts a lot. However, do you have any other processes that will help us? Thank you for your reply.

    • @RelativeSecurity
      @RelativeSecurity 7 หลายเดือนก่อน

      Hi @Abdel what kind of processes are you looking for? They can depend on organisational requirements.

  • @ama4999
    @ama4999 8 หลายเดือนก่อน

    Hey bro, I have a question.. Can you give me the sources that you have used in this video like what websites you used to create this video and understand qatars strategy that would be really helpful.

  • @softwaredynamicsolutions
    @softwaredynamicsolutions 8 หลายเดือนก่อน

    👍

  • @suresh_shankar
    @suresh_shankar 8 หลายเดือนก่อน

    Good definition

  • @jannatjunaid7
    @jannatjunaid7 8 หลายเดือนก่อน

    Thank you for this! Very helpful!

  • @livebigtv8234
    @livebigtv8234 8 หลายเดือนก่อน

    This is awesome, finally got the whole thing in one video. Is it valid for current Windows 10/11, Server 2019/22 also ? Or have things changed ?

  • @Delgado-yu5hs
    @Delgado-yu5hs 9 หลายเดือนก่อน

    Nice

  • @Israelxox
    @Israelxox 9 หลายเดือนก่อน

    Under rated video! Thank you ❤

  • @Tech_meena
    @Tech_meena 9 หลายเดือนก่อน

    Acha jab binary mai hum subtract karain gy to .....carry lay k 10 bna....us mai sy jab 1 minus kia to 1 kaisay bacha...is subtraction ki smj nk aiii

    • @RelativeSecurity
      @RelativeSecurity 9 หลายเดือนก่อน

      Kiun k, 10 binary, 2 decimal k equal hai. 1 binary 1 decimal k equal hai, 2-1=1 is equal to 10-1=1 in binary Good?

    • @Tech_meena
      @Tech_meena 9 หลายเดือนก่อน

      @@RelativeSecurity okayy yess🤝🏻

  • @Tech_meena
    @Tech_meena 9 หลายเดือนก่อน

    3 aur 4 ki binary mai value 3 digits wly sy kiu li .......mtlb kisi sy b lay skty...double waly sy b lay skty ya 3 digits sy hi laini iski smj ni ai.

    • @RelativeSecurity
      @RelativeSecurity 9 หลายเดือนก่อน

      3 kee binary value: 0011 hai, 4 kee binary value: 0100 hai Digits sai farq nhn paraiy ga, bas us kee sahee binary value use karain Agar clear nhn to phir batain, aik session rakh lain gaiye.

    • @Tech_meena
      @Tech_meena 9 หลายเดือนก่อน

      @@RelativeSecurity hmm smj a gai ..... mtlb agar hum 3 ki value 0011 lain ya 011 lain value same hi aye gi....yehi baat hai na?

    • @RelativeSecurity
      @RelativeSecurity 9 หลายเดือนก่อน

      Yes, aap 0011 and 011 ko decimal main convert kar k aap verify kar lain.

  • @kulpykulptington2715
    @kulpykulptington2715 9 หลายเดือนก่อน

    Thank you so much for this video. So many other videos on SIEM are only about 5 minutes long. This is the perfect amount of depth for a beginner to start their own research.

  • @shoaibarshad39
    @shoaibarshad39 9 หลายเดือนก่อน

    Great

  • @Tech_meena
    @Tech_meena 10 หลายเดือนก่อน

    👍🏻👍🏻👍🏻

  • @Wtqr
    @Wtqr 10 หลายเดือนก่อน

    so if theres a quarantined file it wont effect my pc?

  • @sridharj3285
    @sridharj3285 10 หลายเดือนก่อน

    👍thanks for excellent presentation Can you pls do on IBM Qradar tool?