![Relative Security](/img/default-banner.jpg)
- 212
- 437 681
Relative Security
United Kingdom
เข้าร่วมเมื่อ 5 ก.ค. 2009
At Relative Security, we're passionate about your digital safety and security. Our channel is dedicated to providing you with the latest insights, best practices, and expert advice to protect yourself and your organization in an increasingly complex digital landscape.
What You'll Find:
Educational Content: Dive deep into the world of cybersecurity with our comprehensive educational series. From cybersecurity fundamentals to advanced threat analysis, we've got you covered.
Career Advice: Please get in touch and we can offer you a suitable career advice depending on your past experience and expertise.
One-to-One Session: If you'd like to have a one-to-one session about any cyber security related query, interview preparation or trainings, feel free to email us at connect@relativesecurity.com
Stay Connected:
Don't forget to subscribe and hit that notification bell 🔔. Together, we'll build a safer and more secure digital future!
What You'll Find:
Educational Content: Dive deep into the world of cybersecurity with our comprehensive educational series. From cybersecurity fundamentals to advanced threat analysis, we've got you covered.
Career Advice: Please get in touch and we can offer you a suitable career advice depending on your past experience and expertise.
One-to-One Session: If you'd like to have a one-to-one session about any cyber security related query, interview preparation or trainings, feel free to email us at connect@relativesecurity.com
Stay Connected:
Don't forget to subscribe and hit that notification bell 🔔. Together, we'll build a safer and more secure digital future!
MITRE's SOC Strategy 0: Building a World-Class SOC from the Ground Up | 11 SOC Strategies Explained
Are you ready to elevate your Security Operations Center (SOC) to world-class status? In this video, we dive into SOC Strategy 0, the foundational approach outlined in MITRE's "11 Strategies for a World-Class SOC" guide. Discover how this strategy emphasizes the importance of clear mission objectives, team alignment, and a proactive mindset to strengthen your SOC's capabilities.
You'll learn:
The core principles of Strategy 0 and why it's essential for success.
How to define your SOC's mission and align it with organizational goals.
Practical steps to implement this strategy in your SOC operations.
Key takeaways to help you build a robust and effective SOC.
Whether you're a SOC manager, analyst, or cybersecurity professional, this video will provide actionable insights to optimize your operations. Don't forget to like, comment, and subscribe for more cybersecurity strategies and tips!
#SOCStrategy #MITRE11Strategies #CyberSecurity #SOCOptimization #WorldClassSOC
You'll learn:
The core principles of Strategy 0 and why it's essential for success.
How to define your SOC's mission and align it with organizational goals.
Practical steps to implement this strategy in your SOC operations.
Key takeaways to help you build a robust and effective SOC.
Whether you're a SOC manager, analyst, or cybersecurity professional, this video will provide actionable insights to optimize your operations. Don't forget to like, comment, and subscribe for more cybersecurity strategies and tips!
#SOCStrategy #MITRE11Strategies #CyberSecurity #SOCOptimization #WorldClassSOC
มุมมอง: 53
วีดีโอ
Master the Basics of Cybersecurity | Perfect for Security+ and Beyond!
มุมมอง 1.4K21 วันที่ผ่านมา
Master the Basics of Cybersecurity | Perfect for Security and Beyond! In this video, we break down fundamental concepts that are essential for anyone preparing for the CompTIA Security certification or other cybersecurity exams. Whether you're just starting your cybersecurity journey or looking for a refresher, this video has you covered! 🚀 📚 Topics Covered: ✔️ What is Information vs. Data? ✔️ ...
Crowdstrike - BSOD - Issue & Remedy
มุมมอง 4826 หลายเดือนก่อน
CrowdStrike has identified and reverted a faulty update causing BSODs due to csagent.sys, impacting critical services. The issue, related to the Falcon Sensor product, is being addressed by their engineering teams. Learn more about the problem and its remedy. Resolution: "Boot Windows into Safe Mode or the Windows Recovery Environment "Navigate to the C:\Windows\System32\drivers\CrowdStrike dir...
What is SOAR (Security, Orchestration, Automation & Response)
มุมมอง 1.6K6 หลายเดือนก่อน
What is SOAR (Security, Orchestration, Automation & Response)? Want to know how to effectively respond to a security breach? It's crucial to have a solid strategy in place before an incident occurs. In this video, we discuss in detail, How SOAR can help you to efficiently respond to your threats. A SOAR system (Security, Orchestration, Automation & Response) is designed to help you do just that...
CIS Critical Security Controls - Network Monitoring Defense & Security Awareness & Training
มุมมอง 1629 หลายเดือนก่อน
CIS Critical Security Controls - Network Monitoring Defense & Security Awareness & Training Welcome to our latest video on SANS CIS Critical Security Controls - Network Monitoring Defense & Security Awareness & Training! In this episode, we dive deep into critical security controls, focusing on network monitoring defense, and comprehensive security awareness and skills training. If you're invol...
CIS Critical Security Controls - Incident Response Management & Penetration Testing
มุมมอง 729 หลายเดือนก่อน
SANS CIS Critical Security Controls - Incident Response Management & Penetration Testing Welcome to our latest video on SANS CIS Critical Security Controls - Incident Response Management & Penetration Testing! In this episode, we dive deep into critical security controls, focusing on incident response management , and penetration testing. If you're involved in IT, cybersecurity, or enterprise r...
CIS Critical Security Controls - Data Recovery & Network Infrastructure Management
มุมมอง 1139 หลายเดือนก่อน
CIS Critical Security Controls - Data Recovery & Network Infrastructure Management Welcome to our latest video on CIS Critical Security Controls - Data Recovery & Network Infrastructure Management! In this episode, we dive deep into critical security controls, focusing on data recovery and network infrastructure management. If you're involved in IT, cybersecurity, or enterprise risk management,...
CIS Critical Security Controls - Audit Log, Email & Web Protection, Malware Defense
มุมมอง 719 หลายเดือนก่อน
CIS Critical Security Controls - Audit Log, Email & Web Protection, Malware Defense Welcome to our latest video on SANS CIS Critical Security Controls - Audit Log, Email & Web Protection, Malware Defense! In this episode, we dive deep into critical security controls, focusing on Audit Log, Email & Web Protection, Malware Defense. If you're involved in IT, cybersecurity, or enterprise risk manag...
CIS Critical Security Controls - Access Controls and Vulnerability Management
มุมมอง 1099 หลายเดือนก่อน
CIS Critical Security Controls - Access Controls and Vulnerability Management In this informative video, we delve into two critical components of enterprise security: Access Controls and Vulnerability Management. Welcome to our latest video on CIS Critical Security Controls - Access Controls and Vulnerability Management! In this episode, we dive deep into critical security controls, focusing on...
CIS Critical Security Controls - Inventory of Software Assets and Data Protection
มุมมอง 15710 หลายเดือนก่อน
CIS Critical Security Controls - Inventory of Software Assets and Data Protection Welcome to our latest video on CIS Critical Security Controls - Inventory of Software Assets and Data Protection! In this episode, we dive deep into critical security controls, focusing on Inventory of Software Assets and Data Protection. If you're involved in IT, cybersecurity, or enterprise risk management, this...
CIS Critical Security Controls - Secure Configuration and Account Management
มุมมอง 9010 หลายเดือนก่อน
CIS Critical Security Controls - Secure Configuration and Account Management Welcome to our latest video on CIS Critical Security Controls - Secure Configuration and Account Management! In this episode, we dive deep into critical security controls, focusing on Secure Configuration and Account Management. If you're involved in IT, cybersecurity, or enterprise risk management, this video is a mus...
CIS Critical Security Controls - Introduction and Inventory of enterprise assets
มุมมอง 52410 หลายเดือนก่อน
CIS Critical Security Controls - Introduction and Inventory of enterprise assets Welcome to our latest video on CIS Critical Security Controls - Introduction and Inventory of enterprise assets! In this episode, we dive deep into critical security controls, focusing on Introduction and Inventory of enterprise assets. If you're involved in IT, cybersecurity, or enterprise risk management, this vi...
Security Operations Center - Incident Response: Eradication, Recovery and Lessons Learnt Explained
มุมมอง 19310 หลายเดือนก่อน
Explore the intricacies of Incident Response with this comprehensive breakdown of the Eradication, Recovery, and Lessons Learned phases. From neutralizing threats to restoring normal operations and gleaning invaluable insights for future resilience, this video offers a deep dive into each crucial stage of incident resolution. Gain a nuanced understanding of how organizations navigate post-incid...
Security Operations Center - Understanding Incident Response: Identification Phase Explained
มุมมอง 29910 หลายเดือนก่อน
In this video, we delve into the crucial phase of Incident Response: Identification. Discover the key steps and strategies involved in identifying security incidents within an organization's infrastructure. From recognizing early signs to determining the scope and impact of an incident, learn how incident responders leverage various techniques and tools to detect and categorize security threats...
Security Operations Center - Understanding Incident Response: Preparation Phase Explained
มุมมอง 32310 หลายเดือนก่อน
🔒 Incident Response Preparation Phase Explained! 🚨 In this video, we delve into the crucial steps organizations take to fortify their cybersecurity defenses during the Preparation Stage of Incident Response. Discover how dedicated incident response teams are assembled and trained, the importance of clear policies and procedures, and the tools utilized for threat detection and analysis. Learn ab...
Demystifying Zero Trust: Building a Secure Future for Your Digital Landscape"
มุมมอง 12810 หลายเดือนก่อน
Demystifying Zero Trust: Building a Secure Future for Your Digital Landscape"
Security Operations Center - What is SIEM
มุมมอง 2.6K11 หลายเดือนก่อน
Security Operations Center - What is SIEM
Security Operations Center - Introduction to Incident Handling in Cyber Security
มุมมอง 36411 หลายเดือนก่อน
Security Operations Center - Introduction to Incident Handling in Cyber Security
SOC Security Operations Center - SOC as a Service - SOC Roles and Responsibilities - Ep06
มุมมอง 1.1K11 หลายเดือนก่อน
SOC Security Operations Center - SOC as a Service - SOC Roles and Responsibilities - Ep06
What is Cyber Essentials? A guide for small business security..
มุมมอง 40911 หลายเดือนก่อน
What is Cyber Essentials? A guide for small business security..
What is Operational Security? Why is it Important?
มุมมอง 84311 หลายเดือนก่อน
What is Operational Security? Why is it Important?
CS101 Introduction to Computer Programming - EP25 - Strings Lecture - Urdu/Hindi
มุมมอง 44ปีที่แล้ว
CS101 Introduction to Computer Programming - EP25 - Strings Lecture - Urdu/Hindi
CS101 Introduction to Computer Programming - EP24 - Pointers & Functions Lecture - Urdu/Hindi
มุมมอง 16ปีที่แล้ว
CS101 Introduction to Computer Programming - EP24 - Pointers & Functions Lecture - Urdu/Hindi
CS101 Introduction to Computer Programming - EP23 - Pointers & Arrays Lecture - Urdu/Hindi
มุมมอง 12ปีที่แล้ว
CS101 Introduction to Computer Programming - EP23 - Pointers & Arrays Lecture - Urdu/Hindi
CS101 Introduction to Computer Programming - EP22 - Pointers Revision Lecture - Urdu/Hindi
มุมมอง 15ปีที่แล้ว
CS101 Introduction to Computer Programming - EP22 - Pointers Revision Lecture - Urdu/Hindi
CS101 Introduction to Computer Programming - EP21 - Pointers Lecture - Urdu/Hindi
มุมมอง 26ปีที่แล้ว
CS101 Introduction to Computer Programming - EP21 - Pointers Lecture - Urdu/Hindi
CS101 Introduction to Computer Programming - EP20 - Multi Dimensional Arrays Example 2 - Urdu/Hindi
มุมมอง 10ปีที่แล้ว
CS101 Introduction to Computer Programming - EP20 - Multi Dimensional Arrays Example 2 - Urdu/Hindi
CS101 Introduction to Computer Programming - EP19 - Multi Dimensional Arrays Example 1 - Urdu/Hindi
มุมมอง 13ปีที่แล้ว
CS101 Introduction to Computer Programming - EP19 - Multi Dimensional Arrays Example 1 - Urdu/Hindi
Thansk for your clear explanation about SOC. Please continue videos on soc tutorials
Thank you, I will, more coming :)
how about after kerberos? netlogin and lsass, ...?
What would you like next?
Watching this before an interview
Best of luck :) let us know how did it go.
perfectly explained thanks
Appreciate the feedback :)
One way authentication video
Hello, I have done all the process, but while starting the service, and checcking the logs, i am getting two warnings, no routes defined and not starting unused module in windows events, what should i do for that?
These errors seem to be due to incorrect configuration file. Make sure your configuration file is correct and has all the routes defined.
would love if there was a link that contains all the xml that you put in each file. you could use scp to send the files that was changed in master to the slaves. its a good way to verify ssh at the same time. the jumping between screens gave me headache, maybe add some edits and just jump to the clip where you actually made a change. good video either way. (y)
Thank you for the feedback. Appreciate it :) Regarding the xml files, I no longer have access to those files, but I’ll see if I can get the access then will add it here.
Thanks
Welcome
Very thanks for the great video
My pleasure!
Public key is encrypt or decrypt
Public key in itself can be encrypted or decrypted depending on the context where it is being used.
This was really helpful. Do you have similar information about container security?
Glad it was helpful. Not yet but very soon
Is there any one who can build SIEM project for me in paid
Email @ connect@relativesecurity.com your requirements.
Excellent info
Glad it was helpful!
Very well explained.. Thank you.... Please explain in details the vendors too
Okay sure
I can't exactly understand difference between nids and hids please explain more details
Can you elaborate what is the confusion?
Please make videos on all security products
thank you
Very clear and understandable. Thank you very much!
Glad it was helpful!
Great video on Cyber Threat Intelligence! How can businesses effectively implement these practices daily?
Malayali?
Nope :)
I really like the way you explain things, thank you very much for your videos
Glad you like them!
This fix is not authentic yet, did it work for anyone?
So far it is the correct resolution. You can follow this link for automatic remediation script gist.github.com/whichbuffer/7830c73711589dcf9e7a5217797ca617
This is the information we need. Thank you for this channel. Btw one question. What program are you using to see those logs? Or can this be seen with command on a terminal.
Appreciate it. You can use baretail log viewer or simple notepad++ does the trick.
Wow excellent. Very well explained.
Glad it was helpful!
Woah extremely well delivered ! very clear, concise
@josengoran8345 Glad you think so! Please consider to subscribe and like the videos :)
Would be great to have a video on SOAR architecture, similar to SIEM video. Thanks!
th-cam.com/video/4elHo14GNJE/w-d-xo.html. :)
can you do a new vlog on SIEM based on latest processes and technologies, how can we apply AI etc
New series for top strategies for world class SOC …. soon :)
*promosm* 🤷
beautifully explained, clear and to the point. thank you!
Glad it was helpful!
Superb summary on siem. It has been amazing learning from this video.
Glad it was helpful!
Hello sir, first of all. You are an awesome teacher. But why did you remove SIEM from this playlist?. Please sir share some info.
Thank you. Just wanted to keep SOC beginner videos in one playlist. Even though SIEM video you are referring to is a great resource, however I am planning to create a separate playlist for it, or I’ll rename it and make that a permanent part of this play list. What do you suggest? Thank you for your comments, I am glad it was helpful for you.
Sir, your explanation is top notch. The playlist as it was ago, one senior at my work place referred that playlist to me. I was half way through the playlist and the next day it changed.
@@randomness1o2 no worries, I was in the middle of sorting all videos, which may have impacted this list as well. I’ll list down all videos in the playlist here for you soon.
Thank you sir.
can you perfectly sort out your soc playlist ?
Hello @Kaushalpurani5108, Thank you for the feedback. It has been sorted. Shall you need further help or assistance, feel free to comment :) Regards
@@RelativeSecurity I want to do intership in soc so I started learning about soc so can you tell me which topics I should learn to get internship
@@Batmanop17 email us at connect@relativesecurity.com
Can we get the documents for study purpose ?
I am working on it and will try to make them available as soon as possible.
very good explanation
Thanks for liking
Excellent Information
Glad it was helpful!
I hope to continue, and explain more topics and examples. I am an ex-software engineer and now I will focusing on soc analysis. 🇪🇬
I am glad these are helpful for you.
What is a SIEM (Detailed Video) th-cam.com/video/V5XN2hd3BHM/w-d-xo.html
Tnq so much for your video
Most welcome
If IDS can only detect then who actions it after detection?
It would be administrator/analyst who has access to these alerts. If these alerts are being forwarded to a SIEM solution, SOC analyst can take a necessary actions as well.
Thank you!
You're welcome!
Do we still need epp if we already have edr?
It depends on the requirements and policies of the organisation.
Nice Video and Explanation Effort, I was zero in SIEM and was not finding perfect video which can explain SIEM on the higher level..One question I have, how IDS/IPS differ from SIEM then ?
Thank you. IDS: Detects the malicious behaviour. IPS: Blocks the malicious behaviour. SIEM: Correlates the data from different log sources and generates the alert according to the detection rules in place.
Plz upload more shorts videos regarding cyber attacks
Thanks. Coming soon :)
Can i get the soc analyst , edr vs siem notes. please
What kind of notes are you expecting? Connect@relativesecurity.com
Does it require knowledge of how to coding?
Generally, Knowledge of coding is always beneficial if working within IT, however you can do well without it in SOC.
This is very helpful! Thank you sir
Thank you sir very well explained ❤
Most welcome
Thumbs UP! Very good explanation.
Glad it was helpful!
very usefull video.Thank you