Similar Tracks
The Threat Intel Victory Garden: Threat Intelligence Using Open Source Tools - CTI SUMMIT 2017
SANS Digital Forensics and Incident Response
Cybersecurity IDR: Incident Detection & Response | Google Cybersecurity Certificate
Google Career Certificates
Knowing When to Consume Intelligence and When to Generate It - CTI SUMMIT 2017
SANS Digital Forensics and Incident Response
Tracking Threat Actors through YARA Rules and Virus Total - SANS DFIR Summit 2016
SANS Digital Forensics and Incident Response
CTI Summit Keynote - Cliff Stoll - (Still) Stalking the Wily Hacker
SANS Digital Forensics and Incident Response
Conventional Intelligence Analysis in Cyber Threat Intelligence - CTI Summit 2017
SANS Digital Forensics and Incident Response
Threat Intelligence At Microsoft: A Look Inside - Cyber Threat Intelligence Summit 2017
SANS Digital Forensics and Incident Response
A Practical Case of Threat Intelligence – From IoC to Unraveling an Attacker Infrastructure
SANS Digital Forensics and Incident Response
Intelligence Preparation of the Cyber Environment - SANS Cyber Threat Intelligence Summit 2018
SANS Digital Forensics and Incident Response