Relative Security
Relative Security
  • 212
  • 437 681
MITRE's SOC Strategy 0: Building a World-Class SOC from the Ground Up | 11 SOC Strategies Explained
Are you ready to elevate your Security Operations Center (SOC) to world-class status? In this video, we dive into SOC Strategy 0, the foundational approach outlined in MITRE's "11 Strategies for a World-Class SOC" guide. Discover how this strategy emphasizes the importance of clear mission objectives, team alignment, and a proactive mindset to strengthen your SOC's capabilities.
You'll learn:
The core principles of Strategy 0 and why it's essential for success.
How to define your SOC's mission and align it with organizational goals.
Practical steps to implement this strategy in your SOC operations.
Key takeaways to help you build a robust and effective SOC.
Whether you're a SOC manager, analyst, or cybersecurity professional, this video will provide actionable insights to optimize your operations. Don't forget to like, comment, and subscribe for more cybersecurity strategies and tips!
#SOCStrategy #MITRE11Strategies #CyberSecurity #SOCOptimization #WorldClassSOC
มุมมอง: 53

วีดีโอ

Master the Basics of Cybersecurity | Perfect for Security+ and Beyond!
มุมมอง 1.4K21 วันที่ผ่านมา
Master the Basics of Cybersecurity | Perfect for Security and Beyond! In this video, we break down fundamental concepts that are essential for anyone preparing for the CompTIA Security certification or other cybersecurity exams. Whether you're just starting your cybersecurity journey or looking for a refresher, this video has you covered! 🚀 📚 Topics Covered: ✔️ What is Information vs. Data? ✔️ ...
Crowdstrike - BSOD - Issue & Remedy
มุมมอง 4826 หลายเดือนก่อน
CrowdStrike has identified and reverted a faulty update causing BSODs due to csagent.sys, impacting critical services. The issue, related to the Falcon Sensor product, is being addressed by their engineering teams. Learn more about the problem and its remedy. Resolution: "Boot Windows into Safe Mode or the Windows Recovery Environment "Navigate to the C:\Windows\System32\drivers\CrowdStrike dir...
What is SOAR (Security, Orchestration, Automation & Response)
มุมมอง 1.6K6 หลายเดือนก่อน
What is SOAR (Security, Orchestration, Automation & Response)? Want to know how to effectively respond to a security breach? It's crucial to have a solid strategy in place before an incident occurs. In this video, we discuss in detail, How SOAR can help you to efficiently respond to your threats. A SOAR system (Security, Orchestration, Automation & Response) is designed to help you do just that...
CIS Critical Security Controls - Network Monitoring Defense & Security Awareness & Training
มุมมอง 1629 หลายเดือนก่อน
CIS Critical Security Controls - Network Monitoring Defense & Security Awareness & Training Welcome to our latest video on SANS CIS Critical Security Controls - Network Monitoring Defense & Security Awareness & Training! In this episode, we dive deep into critical security controls, focusing on network monitoring defense, and comprehensive security awareness and skills training. If you're invol...
CIS Critical Security Controls - Incident Response Management & Penetration Testing
มุมมอง 729 หลายเดือนก่อน
SANS CIS Critical Security Controls - Incident Response Management & Penetration Testing Welcome to our latest video on SANS CIS Critical Security Controls - Incident Response Management & Penetration Testing! In this episode, we dive deep into critical security controls, focusing on incident response management , and penetration testing. If you're involved in IT, cybersecurity, or enterprise r...
CIS Critical Security Controls - Data Recovery & Network Infrastructure Management
มุมมอง 1139 หลายเดือนก่อน
CIS Critical Security Controls - Data Recovery & Network Infrastructure Management Welcome to our latest video on CIS Critical Security Controls - Data Recovery & Network Infrastructure Management! In this episode, we dive deep into critical security controls, focusing on data recovery and network infrastructure management. If you're involved in IT, cybersecurity, or enterprise risk management,...
CIS Critical Security Controls - Audit Log, Email & Web Protection, Malware Defense
มุมมอง 719 หลายเดือนก่อน
CIS Critical Security Controls - Audit Log, Email & Web Protection, Malware Defense Welcome to our latest video on SANS CIS Critical Security Controls - Audit Log, Email & Web Protection, Malware Defense! In this episode, we dive deep into critical security controls, focusing on Audit Log, Email & Web Protection, Malware Defense. If you're involved in IT, cybersecurity, or enterprise risk manag...
CIS Critical Security Controls - Access Controls and Vulnerability Management
มุมมอง 1099 หลายเดือนก่อน
CIS Critical Security Controls - Access Controls and Vulnerability Management In this informative video, we delve into two critical components of enterprise security: Access Controls and Vulnerability Management. Welcome to our latest video on CIS Critical Security Controls - Access Controls and Vulnerability Management! In this episode, we dive deep into critical security controls, focusing on...
CIS Critical Security Controls - Inventory of Software Assets and Data Protection
มุมมอง 15710 หลายเดือนก่อน
CIS Critical Security Controls - Inventory of Software Assets and Data Protection Welcome to our latest video on CIS Critical Security Controls - Inventory of Software Assets and Data Protection! In this episode, we dive deep into critical security controls, focusing on Inventory of Software Assets and Data Protection. If you're involved in IT, cybersecurity, or enterprise risk management, this...
CIS Critical Security Controls - Secure Configuration and Account Management
มุมมอง 9010 หลายเดือนก่อน
CIS Critical Security Controls - Secure Configuration and Account Management Welcome to our latest video on CIS Critical Security Controls - Secure Configuration and Account Management! In this episode, we dive deep into critical security controls, focusing on Secure Configuration and Account Management. If you're involved in IT, cybersecurity, or enterprise risk management, this video is a mus...
CIS Critical Security Controls - Introduction and Inventory of enterprise assets
มุมมอง 52410 หลายเดือนก่อน
CIS Critical Security Controls - Introduction and Inventory of enterprise assets Welcome to our latest video on CIS Critical Security Controls - Introduction and Inventory of enterprise assets! In this episode, we dive deep into critical security controls, focusing on Introduction and Inventory of enterprise assets. If you're involved in IT, cybersecurity, or enterprise risk management, this vi...
Security Operations Center - Incident Response: Eradication, Recovery and Lessons Learnt Explained
มุมมอง 19310 หลายเดือนก่อน
Explore the intricacies of Incident Response with this comprehensive breakdown of the Eradication, Recovery, and Lessons Learned phases. From neutralizing threats to restoring normal operations and gleaning invaluable insights for future resilience, this video offers a deep dive into each crucial stage of incident resolution. Gain a nuanced understanding of how organizations navigate post-incid...
Security Operations Center - Understanding Incident Response: Identification Phase Explained
มุมมอง 29910 หลายเดือนก่อน
In this video, we delve into the crucial phase of Incident Response: Identification. Discover the key steps and strategies involved in identifying security incidents within an organization's infrastructure. From recognizing early signs to determining the scope and impact of an incident, learn how incident responders leverage various techniques and tools to detect and categorize security threats...
Security Operations Center - Understanding Incident Response: Preparation Phase Explained
มุมมอง 32310 หลายเดือนก่อน
🔒 Incident Response Preparation Phase Explained! 🚨 In this video, we delve into the crucial steps organizations take to fortify their cybersecurity defenses during the Preparation Stage of Incident Response. Discover how dedicated incident response teams are assembled and trained, the importance of clear policies and procedures, and the tools utilized for threat detection and analysis. Learn ab...
Demystifying Zero Trust: Building a Secure Future for Your Digital Landscape"
มุมมอง 12810 หลายเดือนก่อน
Demystifying Zero Trust: Building a Secure Future for Your Digital Landscape"
Security Operations Center - What is SIEM
มุมมอง 2.6K11 หลายเดือนก่อน
Security Operations Center - What is SIEM
Security Operations Center - Introduction to Incident Handling in Cyber Security
มุมมอง 36411 หลายเดือนก่อน
Security Operations Center - Introduction to Incident Handling in Cyber Security
SOC Security Operations Center - SOC as a Service - SOC Roles and Responsibilities - Ep06
มุมมอง 1.1K11 หลายเดือนก่อน
SOC Security Operations Center - SOC as a Service - SOC Roles and Responsibilities - Ep06
Fundamentals of Information Security
มุมมอง 7611 หลายเดือนก่อน
Fundamentals of Information Security
What is Information Security?
มุมมอง 14911 หลายเดือนก่อน
What is Information Security?
What is Cyber Essentials? A guide for small business security..
มุมมอง 40911 หลายเดือนก่อน
What is Cyber Essentials? A guide for small business security..
What is Operational Security? Why is it Important?
มุมมอง 84311 หลายเดือนก่อน
What is Operational Security? Why is it Important?
CS101 Introduction to Computer Programming - EP25 - Strings Lecture - Urdu/Hindi
มุมมอง 44ปีที่แล้ว
CS101 Introduction to Computer Programming - EP25 - Strings Lecture - Urdu/Hindi
CS101 Introduction to Computer Programming - EP24 - Pointers & Functions Lecture - Urdu/Hindi
มุมมอง 16ปีที่แล้ว
CS101 Introduction to Computer Programming - EP24 - Pointers & Functions Lecture - Urdu/Hindi
CS101 Introduction to Computer Programming - EP23 - Pointers & Arrays Lecture - Urdu/Hindi
มุมมอง 12ปีที่แล้ว
CS101 Introduction to Computer Programming - EP23 - Pointers & Arrays Lecture - Urdu/Hindi
CS101 Introduction to Computer Programming - EP22 - Pointers Revision Lecture - Urdu/Hindi
มุมมอง 15ปีที่แล้ว
CS101 Introduction to Computer Programming - EP22 - Pointers Revision Lecture - Urdu/Hindi
CS101 Introduction to Computer Programming - EP21 - Pointers Lecture - Urdu/Hindi
มุมมอง 26ปีที่แล้ว
CS101 Introduction to Computer Programming - EP21 - Pointers Lecture - Urdu/Hindi
CS101 Introduction to Computer Programming - EP20 - Multi Dimensional Arrays Example 2 - Urdu/Hindi
มุมมอง 10ปีที่แล้ว
CS101 Introduction to Computer Programming - EP20 - Multi Dimensional Arrays Example 2 - Urdu/Hindi
CS101 Introduction to Computer Programming - EP19 - Multi Dimensional Arrays Example 1 - Urdu/Hindi
มุมมอง 13ปีที่แล้ว
CS101 Introduction to Computer Programming - EP19 - Multi Dimensional Arrays Example 1 - Urdu/Hindi

ความคิดเห็น

  • @FighterReturns
    @FighterReturns 9 วันที่ผ่านมา

    Thansk for your clear explanation about SOC. Please continue videos on soc tutorials

    • @RelativeSecurity
      @RelativeSecurity 8 วันที่ผ่านมา

      Thank you, I will, more coming :)

  • @DavidR-v6l
    @DavidR-v6l 16 วันที่ผ่านมา

    how about after kerberos? netlogin and lsass, ...?

  • @Shahzaibkh9
    @Shahzaibkh9 หลายเดือนก่อน

    Watching this before an interview

    • @RelativeSecurity
      @RelativeSecurity หลายเดือนก่อน

      Best of luck :) let us know how did it go.

  • @iranparast45
    @iranparast45 หลายเดือนก่อน

    perfectly explained thanks

    • @RelativeSecurity
      @RelativeSecurity หลายเดือนก่อน

      Appreciate the feedback :)

  • @tours3661
    @tours3661 หลายเดือนก่อน

    One way authentication video

  • @JagadishBhattacharjee-t9k
    @JagadishBhattacharjee-t9k 2 หลายเดือนก่อน

    Hello, I have done all the process, but while starting the service, and checcking the logs, i am getting two warnings, no routes defined and not starting unused module in windows events, what should i do for that?

    • @RelativeSecurity
      @RelativeSecurity 2 หลายเดือนก่อน

      These errors seem to be due to incorrect configuration file. Make sure your configuration file is correct and has all the routes defined.

  • @mahdi9064
    @mahdi9064 2 หลายเดือนก่อน

    would love if there was a link that contains all the xml that you put in each file. you could use scp to send the files that was changed in master to the slaves. its a good way to verify ssh at the same time. the jumping between screens gave me headache, maybe add some edits and just jump to the clip where you actually made a change. good video either way. (y)

    • @RelativeSecurity
      @RelativeSecurity 2 หลายเดือนก่อน

      Thank you for the feedback. Appreciate it :) Regarding the xml files, I no longer have access to those files, but I’ll see if I can get the access then will add it here.

  • @GetachewDubaSagaro
    @GetachewDubaSagaro 3 หลายเดือนก่อน

    Thanks

  • @abokenanaldeek1808
    @abokenanaldeek1808 3 หลายเดือนก่อน

    Very thanks for the great video

  • @MaheshwariBobbala-qo6tu
    @MaheshwariBobbala-qo6tu 3 หลายเดือนก่อน

    Public key is encrypt or decrypt

    • @RelativeSecurity
      @RelativeSecurity 3 หลายเดือนก่อน

      Public key in itself can be encrypted or decrypted depending on the context where it is being used.

  • @aditibhoot2393
    @aditibhoot2393 3 หลายเดือนก่อน

    This was really helpful. Do you have similar information about container security?

    • @RelativeSecurity
      @RelativeSecurity 3 หลายเดือนก่อน

      Glad it was helpful. Not yet but very soon

  • @diksha24.
    @diksha24. 3 หลายเดือนก่อน

    Is there any one who can build SIEM project for me in paid

    • @RelativeSecurity
      @RelativeSecurity 3 หลายเดือนก่อน

      Email @ connect@relativesecurity.com your requirements.

  • @dxvaan
    @dxvaan 4 หลายเดือนก่อน

    Excellent info

  • @rishikeshkumar2312
    @rishikeshkumar2312 4 หลายเดือนก่อน

    Very well explained.. Thank you.... Please explain in details the vendors too

  • @NusrathAlikutty
    @NusrathAlikutty 4 หลายเดือนก่อน

    I can't exactly understand difference between nids and hids please explain more details

    • @RelativeSecurity
      @RelativeSecurity 4 หลายเดือนก่อน

      Can you elaborate what is the confusion?

  • @NaveenKumar-oi7sb
    @NaveenKumar-oi7sb 4 หลายเดือนก่อน

    Please make videos on all security products

  • @shortvideoking41
    @shortvideoking41 4 หลายเดือนก่อน

    thank you

  • @Ph0eniXBawss
    @Ph0eniXBawss 5 หลายเดือนก่อน

    Very clear and understandable. Thank you very much!

  • @JossOrtan
    @JossOrtan 5 หลายเดือนก่อน

    Great video on Cyber Threat Intelligence! How can businesses effectively implement these practices daily?

  • @mohammedbava9680
    @mohammedbava9680 5 หลายเดือนก่อน

    Malayali?

  • @andraskhan
    @andraskhan 6 หลายเดือนก่อน

    I really like the way you explain things, thank you very much for your videos

  • @nextstep6403
    @nextstep6403 6 หลายเดือนก่อน

    This fix is not authentic yet, did it work for anyone?

    • @RelativeSecurity
      @RelativeSecurity 6 หลายเดือนก่อน

      So far it is the correct resolution. You can follow this link for automatic remediation script gist.github.com/whichbuffer/7830c73711589dcf9e7a5217797ca617

  • @RS-nc5qx
    @RS-nc5qx 7 หลายเดือนก่อน

    This is the information we need. Thank you for this channel. Btw one question. What program are you using to see those logs? Or can this be seen with command on a terminal.

    • @RelativeSecurity
      @RelativeSecurity 7 หลายเดือนก่อน

      Appreciate it. You can use baretail log viewer or simple notepad++ does the trick.

  • @UnicTools-d6g
    @UnicTools-d6g 8 หลายเดือนก่อน

    Wow excellent. Very well explained.

  • @josengoran8345
    @josengoran8345 8 หลายเดือนก่อน

    Woah extremely well delivered ! very clear, concise

    • @RelativeSecurity
      @RelativeSecurity 8 หลายเดือนก่อน

      @josengoran8345 Glad you think so! Please consider to subscribe and like the videos :)

  • @tuannguyenanh175
    @tuannguyenanh175 8 หลายเดือนก่อน

    Would be great to have a video on SOAR architecture, similar to SIEM video. Thanks!

    • @RelativeSecurity
      @RelativeSecurity 7 หลายเดือนก่อน

      th-cam.com/video/4elHo14GNJE/w-d-xo.html. :)

  • @Lima3578user
    @Lima3578user 9 หลายเดือนก่อน

    can you do a new vlog on SIEM based on latest processes and technologies, how can we apply AI etc

    • @RelativeSecurity
      @RelativeSecurity 8 วันที่ผ่านมา

      New series for top strategies for world class SOC …. soon :)

  • @wellsolivieri7766
    @wellsolivieri7766 9 หลายเดือนก่อน

    *promosm* 🤷

  • @blueshadow3794
    @blueshadow3794 9 หลายเดือนก่อน

    beautifully explained, clear and to the point. thank you!

  • @dr.moizaabid7370
    @dr.moizaabid7370 9 หลายเดือนก่อน

    Superb summary on siem. It has been amazing learning from this video.

  • @randomness1o2
    @randomness1o2 9 หลายเดือนก่อน

    Hello sir, first of all. You are an awesome teacher. But why did you remove SIEM from this playlist?. Please sir share some info.

    • @RelativeSecurity
      @RelativeSecurity 9 หลายเดือนก่อน

      Thank you. Just wanted to keep SOC beginner videos in one playlist. Even though SIEM video you are referring to is a great resource, however I am planning to create a separate playlist for it, or I’ll rename it and make that a permanent part of this play list. What do you suggest? Thank you for your comments, I am glad it was helpful for you.

    • @randomness1o2
      @randomness1o2 9 หลายเดือนก่อน

      Sir, your explanation is top notch. The playlist as it was ago, one senior at my work place referred that playlist to me. I was half way through the playlist and the next day it changed.

    • @RelativeSecurity
      @RelativeSecurity 9 หลายเดือนก่อน

      @@randomness1o2 no worries, I was in the middle of sorting all videos, which may have impacted this list as well. I’ll list down all videos in the playlist here for you soon.

    • @randomness1o2
      @randomness1o2 9 หลายเดือนก่อน

      Thank you sir.

  • @Batmanop17
    @Batmanop17 9 หลายเดือนก่อน

    can you perfectly sort out your soc playlist ?

    • @RelativeSecurity
      @RelativeSecurity 9 หลายเดือนก่อน

      Hello @Kaushalpurani5108, Thank you for the feedback. It has been sorted. Shall you need further help or assistance, feel free to comment :) Regards

    • @Batmanop17
      @Batmanop17 9 หลายเดือนก่อน

      @@RelativeSecurity I want to do intership in soc so I started learning about soc so can you tell me which topics I should learn to get internship

    • @RelativeSecurity
      @RelativeSecurity 9 หลายเดือนก่อน

      @@Batmanop17 email us at connect@relativesecurity.com

  • @divyansharya6615
    @divyansharya6615 10 หลายเดือนก่อน

    Can we get the documents for study purpose ?

    • @RelativeSecurity
      @RelativeSecurity 9 หลายเดือนก่อน

      I am working on it and will try to make them available as soon as possible.

  • @Pidamoussouma
    @Pidamoussouma 10 หลายเดือนก่อน

    very good explanation

  • @AbkibarVishnuSarkar
    @AbkibarVishnuSarkar 10 หลายเดือนก่อน

    Excellent Information

  • @islamdiab9483
    @islamdiab9483 11 หลายเดือนก่อน

    I hope to continue, and explain more topics and examples. I am an ex-software engineer and now I will focusing on soc analysis. 🇪🇬

    • @RelativeSecurity
      @RelativeSecurity 11 หลายเดือนก่อน

      I am glad these are helpful for you.

  • @RelativeSecurity
    @RelativeSecurity 11 หลายเดือนก่อน

    What is a SIEM (Detailed Video) th-cam.com/video/V5XN2hd3BHM/w-d-xo.html

  • @ramanagudluru
    @ramanagudluru 11 หลายเดือนก่อน

    Tnq so much for your video

  • @johnpavith
    @johnpavith 11 หลายเดือนก่อน

    If IDS can only detect then who actions it after detection?

    • @RelativeSecurity
      @RelativeSecurity 11 หลายเดือนก่อน

      It would be administrator/analyst who has access to these alerts. If these alerts are being forwarded to a SIEM solution, SOC analyst can take a necessary actions as well.

  • @Sarakness
    @Sarakness 11 หลายเดือนก่อน

    Thank you!

  • @fisa6835
    @fisa6835 11 หลายเดือนก่อน

    Do we still need epp if we already have edr?

    • @RelativeSecurity
      @RelativeSecurity 11 หลายเดือนก่อน

      It depends on the requirements and policies of the organisation.

  • @rasikbhuimbar9831
    @rasikbhuimbar9831 11 หลายเดือนก่อน

    Nice Video and Explanation Effort, I was zero in SIEM and was not finding perfect video which can explain SIEM on the higher level..One question I have, how IDS/IPS differ from SIEM then ?

    • @RelativeSecurity
      @RelativeSecurity 11 หลายเดือนก่อน

      Thank you. IDS: Detects the malicious behaviour. IPS: Blocks the malicious behaviour. SIEM: Correlates the data from different log sources and generates the alert according to the detection rules in place.

  • @Aryan-ij3bx
    @Aryan-ij3bx ปีที่แล้ว

    Plz upload more shorts videos regarding cyber attacks

  • @mohammedarshad8521
    @mohammedarshad8521 ปีที่แล้ว

    Can i get the soc analyst , edr vs siem notes. please

    • @RelativeSecurity
      @RelativeSecurity ปีที่แล้ว

      What kind of notes are you expecting? Connect@relativesecurity.com

  • @shooshoo1416
    @shooshoo1416 ปีที่แล้ว

    Does it require knowledge of how to coding?

    • @RelativeSecurity
      @RelativeSecurity ปีที่แล้ว

      Generally, Knowledge of coding is always beneficial if working within IT, however you can do well without it in SOC.

  • @steventelfer8186
    @steventelfer8186 ปีที่แล้ว

    This is very helpful! Thank you sir

  • @tonyajit9202
    @tonyajit9202 ปีที่แล้ว

    Thank you sir very well explained ❤

  • @esmatsaidy
    @esmatsaidy ปีที่แล้ว

    Thumbs UP! Very good explanation.

  • @AswathyBabu-n5l
    @AswathyBabu-n5l ปีที่แล้ว

    very usefull video.Thank you