In this video walkthrough, we covered the concept of threat intelligence, how it's performed and what are the IOCs collected during threat intelligence and how they are used and standarized to be implemented in SOC to hunt for threats and prevent future cyber attacks. This video is part of TryHackMe Threat Intelligence for SOC which is part of SOC Level 2.
****
Receive Cyber Security Field, Certifications Notes and Special Training Videos
/ @motasemhamdan
******
Writeup
motasem-notes.net/en/using-so...
TryHackMe Threat Intelligence for SOC
tryhackme.com/r/room/threatin...
********
Google Profile
maps.app.goo.gl/eLotQQb7Dm6ai...
LinkedIn
[1]: / motasem-hamdan-7673289b
[2]: / motasem-eldad-ha-bb424...
Instagram
/ motasem.hamdan.official
Twitter
/ manmotasem
Facebook
/ motasemhamdantty
Негізгі бет Using SOC & Threat Intelligence in Cybersecurity | TryHackMe Threat Intelligence for SOC
Пікірлер: 3