www.activecountermeasures.com
Today’s adversaries are getting better and better at hiding their backdoor command and control traffic, and the data they’re sneaking out of your network. The skills gap to ramp up new SOC personnel is getting more and more difficult to bridge. Active Countermeasures offers you tools almost any IT pro can use to detect these malicious backdoors.
Пікірлер
Lol this is awesome - I cant wait to sit in on the June class
This was great. I look forward to more like this.
great video with an in depth realistic security response i rly liked this
awesome stuff bill!
hi Chris, i miss this Training, will i still get the certificate if i do the recording ?
Yet another fantastic webinar, Chris! Thank you so much for sharing your knowledge with the community, truly inspirational! 🙏
What a bunch of dorks
Nice vid.
very clear, lucid explanations thanks Chris.
Oh man, the mcedit tool has never looked so cool Bill!
Excellent thank
Bill "1006 different projects" Stearns 😆
Thanks for this amazing session
great work team AC, the new UI is beautiful! y'all should be proud :)
Awesome as usual!
"Promosm" 😞
Will the product work in a AWS environment? A tap makes me think a data center. I maybe wrong but all work will be with ec2 instances. Just need more info.
This was an excellent presentation. Extremely helpful.
Yet another awesome webinar by Chris! Thank you so much to Active Countermeasures and Chris Brenton for this wonderful content 🙏
Great session! Very interesting method for monitoring network. Wish we could've touched a bit more on zeek, zeekctl, and other relevant CLI stuff. Thanks, Chris Brenton!
thanks, unfortunately I don't see the rolling database, only the examples
Really cool way of threat-hunting, would u say something like this could be created in Splunk with the right log sources?
Super cool presentation. 😀
Special thanks to Chris for going through with this October version despite being sick 🙏👏👏👏
Awesome!!!!
Watched the last one it was really good
Good Stuff😁😁
fun fact re: US driving on RHS instead of LHS: in the United States, large freight wagons driven by teams of horses would often have the driver sitting on the left rear horse, holding a whip in his right hand. This position allowed the driver to have a better view of the road if he was driving on the right side.
am loving ac-hunter it makes analysis easy with securityonion and pfsense. thanks guys for making this free for enthusiast.
Thank you for the quick demo!
Another gem of content. Perfect for someone new to the role such as myself!
It's been a while since I took the course... Nice improvement and might be attending next live session
Fantastic! Can't wait for the August training as well!
ditto - see you there :)
If I am using Option 4, how do I get to use Zeek?
second time i'm doing this and just signed up for the advanced training on 24+25 august. you are an incredible teacher chris - looking fwd to getting in deeper!
Great ,Thanks you for sharing 😊
will April's recording be posted here?
thank you
///Download AC-Hunter CE www.activecountermeasures.com/ac-hunter-community-edition/download/
///Download AC-Hunter CE www.activecountermeasures.com/ac-hunter-community-edition/download/
Test Drive AC-Hunter Community Edition yourself! www.activecountermeasures.com/ac-hunter-community-edition/
Test Drive AC-Hunter™ Community Edition yourself! www.activecountermeasures.com/ac-hunter-community-edition/
great !!!!!
This is absolute gold, thank you.
Thank you for sharing
Much anticipated. Thanks for this upload
Great stuff guys! I was trying to register for the four hours threat hunting course but it says it's no longer available
Threat Hunting Training Level 1 is now 6 hours. You can register here: www.activecountermeasures.com/hunt-training/ in addition, Chris Brenton has an Advanced Training Course. You can find that schedule here: www.antisyphontraining.com/advanced-network-threat-hunting-w-chris-brenton/
Hi, can you please make a video & explain the writing/structure of Ansible & Terraform in a simple manner & in layman's terms step by step, like when & where to add spaces, hyphens, what is variable, etc it's a bit confusing ...I am not from a programming background hence find it difficult to understand the structure of writing Ansible & Terraform. Please it's a request, do reply
The work you guys are doing is amazing!!! 🙌🙌
Do y'all recommend installing on a VM or on a real Ubuntu build?