HI Adam. I first seen you on Medium with your articles in which I always thought they were fully written out and very verbose about MISP. I am really happy to see these videos here on TH-cam. I am more than happy to subscribe. Thank you for your efforts and keep them coming. Much appreciated
@@adamgoss-kraven Dear Adam, The great thing about your videos is that in just 10-15 minutes, you can elevate a beginner to a cybersecurity pro. You also take a tool and cover it from every angle (via your Platform Series). Remember, for learners, scenario-based learning-showing how the tool is used in various cases-is the most important. Theory is already available on Google and through AI. Sometimes people struggle with the basic installations/concepts, but you have covered those in your videos. For platforms, it would be awesome to see full coverage on tools like: 1. SpiderFoot: For reconnaissance and gathering initial data about potential threats using automated scanning and OSINT techniques. 2. The Harvester: To collect email addresses, subdomains, and other relevant information to profile targets. 3. Recon-ng: A powerful framework for web reconnaissance, allowing detailed data collection and analysis. 4. Yeti: To manage threat intelligence, helping researchers to store and analyze data effectively. 5. OpenCTI: To visualize and correlate threat data, facilitating collaboration and operational insights. 6. TheHive: For incident response and case management, allowing researchers to respond to confirmed threats efficiently. 7. Sigma: To create and share detection rules that can be translated into queries for various SIEMs, enhancing threat detection capabilities. Thanks! All the best :)
@@adamgoss-kraven Dear Adam, The great thing about your videos is that in just 10-15 minutes, you can elevate a beginner to a cybersecurity pro. You also take a tool and cover it from every angle, which is incredibly helpful. For learners, scenario-based learning-demonstrating how tools are used in various cases-is essential, especially since many people struggle with basic concepts and installations. Your videos have made this easier for so many. It would be awesome to see full coverage on tools like: MISP - Malware Information Sharing Platform: A tool for sharing structured threat information to improve detection and response capabilities. TheHive - A scalable, open-source Security Incident Response Platform that helps security teams manage incidents and analyze threat data. OpenCTI - A platform to manage Cyber Threat Intelligence in a structured way, providing comprehensive coverage and context. Yeti - A threat intelligence framework that helps users gather and analyze threat data while facilitating collaboration. SpiderFoot - An OSINT automation tool that helps gather data on IPs, domains, and other entities for threat reconnaissance. Harvester - A tool for gathering emails, subdomains, hosts, employee names, and other information from public sources. Recon-ng - A full-featured web reconnaissance framework that allows users to conduct open-source web-based reconnaissance. Cuckoo Sandbox - An automated malware analysis system that helps in analyzing suspicious files and observing their behavior in a safe environment. Sigma - A generic signature format for SIEM systems, helping to create a wide range of detection rules based on various log sources. Thanks! All the best :)
@@adamgoss-kraven Dear Adam, Your videos do an incredible job of elevating beginners to cybersecurity pros in just 10-15 minutes! I appreciate how you cover each tool from every angle. Scenario-based learning is vital, especially for those struggling with basic concepts and installations. It would be great to see coverage on tools like: MISP - Malware Information Sharing Platform TheHive - Security Incident Response Platform OpenCTI - Cyber Threat Intelligence management Yeti - Threat intelligence framework SpiderFoot - OSINT automation tool Harvester - Public information gathering tool Recon-ng - Web reconnaissance framework Cuckoo Sandbox - Automated malware analysis system Sigma - SIEM signature format These tools provide valuable threat intelligence and analysis capabilities! Thanks and Regards :)
@@adamgoss-kraven Dear Adam, I like how your videos elevate beginners to cybersecurity pros in just 10-15 minutes! Your in-depth coverage of each tool is invaluable. Scenario-based learning is key, especially for those struggling with basic concepts and installations. I'd love to see coverage on the following tools: MISP: Malware Information Sharing Platform TheHive: Security Incident Response Platform OpenCTI: Cyber Threat Intelligence management Yeti: Threat intelligence framework SpiderFoot: OSINT automation tool Harvester: Public information gathering tool Recon-ng: Web reconnaissance framework Cuckoo Sandbox: Automated malware analysis Sigma: SIEM signature format These platforms could really enhance our understanding of threat intelligence! :)
Thanks Adam for the valuabe information
Hey, Adam. I just saw your latest video. This is great content!
HI Adam.
I first seen you on Medium with your articles in which I always thought they were fully written out and very verbose about MISP. I am really happy to see these videos here on TH-cam. I am more than happy to subscribe. Thank you for your efforts and keep them coming. Much appreciated
Thanks and thanks for the sub! Hoping to get more uploaded soon.
Indeed informative!! Thank You Adam :). Request to make such videos for other OSINT sources/platforms as well.
@@vasundhragupta108 thanks! Are there any platforms you’d like to see covered in particular?
@@adamgoss-kraven Dear Adam,
The great thing about your videos is that in just 10-15 minutes, you can elevate a beginner to a cybersecurity pro. You also take a tool and cover it from every angle (via your Platform Series). Remember, for learners, scenario-based learning-showing how the tool is used in various cases-is the most important. Theory is already available on Google and through AI. Sometimes people struggle with the basic installations/concepts, but you have covered those in your videos.
For platforms, it would be awesome to see full coverage on tools like:
1. SpiderFoot: For reconnaissance and gathering initial data about potential threats using automated scanning and OSINT techniques.
2. The Harvester: To collect email addresses, subdomains, and other relevant information to profile targets.
3. Recon-ng: A powerful framework for web reconnaissance, allowing detailed data collection and analysis.
4. Yeti: To manage threat intelligence, helping researchers to store and analyze data effectively.
5. OpenCTI: To visualize and correlate threat data, facilitating collaboration and operational insights.
6. TheHive: For incident response and case management, allowing researchers to respond to confirmed threats efficiently.
7. Sigma: To create and share detection rules that can be translated into queries for various SIEMs, enhancing threat detection capabilities.
Thanks! All the best :)
@@adamgoss-kraven Dear Adam, The great thing about your videos is that in just 10-15 minutes, you can elevate a beginner to a cybersecurity pro. You also take a tool and cover it from every angle, which is incredibly helpful. For learners, scenario-based learning-demonstrating how tools are used in various cases-is essential, especially since many people struggle with basic concepts and installations. Your videos have made this easier for so many.
It would be awesome to see full coverage on tools like:
MISP - Malware Information Sharing Platform: A tool for sharing structured threat information to improve detection and response capabilities.
TheHive - A scalable, open-source Security Incident Response Platform that helps security teams manage incidents and analyze threat data.
OpenCTI - A platform to manage Cyber Threat Intelligence in a structured way, providing comprehensive coverage and context.
Yeti - A threat intelligence framework that helps users gather and analyze threat data while facilitating collaboration.
SpiderFoot - An OSINT automation tool that helps gather data on IPs, domains, and other entities for threat reconnaissance.
Harvester - A tool for gathering emails, subdomains, hosts, employee names, and other information from public sources.
Recon-ng - A full-featured web reconnaissance framework that allows users to conduct open-source web-based reconnaissance.
Cuckoo Sandbox - An automated malware analysis system that helps in analyzing suspicious files and observing their behavior in a safe environment.
Sigma - A generic signature format for SIEM systems, helping to create a wide range of detection rules based on various log sources.
Thanks! All the best :)
@@adamgoss-kraven Dear Adam, Your videos do an incredible job of elevating beginners to cybersecurity pros in just 10-15 minutes! I appreciate how you cover each tool from every angle. Scenario-based learning is vital, especially for those struggling with basic concepts and installations.
It would be great to see coverage on tools like:
MISP - Malware Information Sharing Platform
TheHive - Security Incident Response Platform
OpenCTI - Cyber Threat Intelligence management
Yeti - Threat intelligence framework
SpiderFoot - OSINT automation tool
Harvester - Public information gathering tool
Recon-ng - Web reconnaissance framework
Cuckoo Sandbox - Automated malware analysis system
Sigma - SIEM signature format
These tools provide valuable threat intelligence and analysis capabilities!
Thanks and Regards :)
@@adamgoss-kraven Dear Adam, I like how your videos elevate beginners to cybersecurity pros in just 10-15 minutes! Your in-depth coverage of each tool is invaluable. Scenario-based learning is key, especially for those struggling with basic concepts and installations.
I'd love to see coverage on the following tools:
MISP: Malware Information Sharing Platform
TheHive: Security Incident Response Platform
OpenCTI: Cyber Threat Intelligence management
Yeti: Threat intelligence framework
SpiderFoot: OSINT automation tool
Harvester: Public information gathering tool
Recon-ng: Web reconnaissance framework
Cuckoo Sandbox: Automated malware analysis
Sigma: SIEM signature format
These platforms could really enhance our understanding of threat intelligence! :)