Determining Normal - Baselining with Security Log and Event Data

Determining Normal - Baselining with Security Log and Event Data

BSidesLV via YouTube Direct link

Intro

1 of 37

1 of 37

Intro

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Determining Normal - Baselining with Security Log and Event Data

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Who am I
  3. 3 Agenda
  4. 4 Log data is underutilized
  5. 5 Practical strategies
  6. 6 Importance of normal
  7. 7 Hunting
  8. 8 Baselines
  9. 9 Logging Log Management
  10. 10 Normal Distribution
  11. 11 NonNormal Distribution
  12. 12 Windows Event Rate
  13. 13 Example
  14. 14 Obtaining Data
  15. 15 Questions to Ask
  16. 16 Visualizing Data
  17. 17 Outliers
  18. 18 Weekend
  19. 19 Handling Outliers
  20. 20 QQ Plot
  21. 21 Three Sigma Rule
  22. 22 Use Cases
  23. 23 RDP
  24. 24 RDP Access
  25. 25 Use Case Primer
  26. 26 Requirements
  27. 27 Event Sources
  28. 28 Validation
  29. 29 Histogram
  30. 30 ShapiroWilkes
  31. 31 Recap
  32. 32 What can you create
  33. 33 References
  34. 34 Questions
  35. 35 Log Reduction
  36. 36 Weekends
  37. 37 Friday

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.