Podcasts about security onion

  • 22PODCASTS
  • 42EPISODES
  • 55mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Jan 3, 2024LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about security onion

Latest podcast episodes about security onion

InfosecTrain
Free Security Operations Center SOC Fundamentals Training Session2

InfosecTrain

Play Episode Listen Later Jan 3, 2024 59:31


InfosecTrain
Free Security Operations Center SOC Fundamentals Training Session 3

InfosecTrain

Play Episode Listen Later Jan 3, 2024 59:03


Security Happy Hour
Celebrating Milestones and Navigating the Cybersecurity Industry: Personal Journeys and Practical Advice

Security Happy Hour

Play Episode Listen Later Jul 5, 2023 89:32 Transcription Available


How about we celebrate together? We've recently hit 4,000 subscribers on YouTube and we've got an enlightening discussion lined up for you! Join us in a vibrant exchange with Griffin, Bill Eck, and Misha where they share their personal journeys into the world of cybersecurity. Hear the inspiring stories of Bill's progress with the Cyber Defense 101 course and Griffin juggling a full-time job while delving into cybersecurity studies. Plus, we answer your burning questions, starting with Carrie's query on finding free and effective resources to kick-off a cybersecurity career.But there's more! Ever felt overwhelmed by the job search process? Even with experience and certifications in hand, finding the right fit can seem daunting. That's where Misha and Christine come in. They share their insights on the job hunt process, providing advice on how to remain persistent and accept that sometimes, any job is a good job. From the power of Python to the benefits of writing down your notes, we cover the techniques that'll help enhance your learning process.In the final part of our celebratory episode, we discuss how to navigate the unpredictable waters of the cybersecurity industry. We talk about the significance of hands-on experience, networking, and consistency in molding your personal brand. All while exploring roles beyond pen testing and the pivotal role communication plays in our field. So, join us as we navigate the complexities of cybersecurity together, learning from each other, and utilizing the resources at our disposal. This episode is a treasure trove of advice, insights, and personal tales that will inspire and motivate anyone with an interest in cybersecurity.Support the showSupport the showMerch: https://cyberwarriorstudios.com/storeYoutube: https://youtube.cyberwarriorstudios.comTwitch: https://twitch.tv/CyberWarriorStudiosTwitter: @CyberWarriorSt1Discord: https://discord.gg/eCSRzM6mJf

Security Happy Hour
Do You Want to be a Pentester?

Security Happy Hour

Play Episode Listen Later Apr 5, 2023 77:04


Do you want to be a pentester? Are you interested in breaking into websites and networks legally? Hear from InfoSec Pat on what it takes to enter the field, creating content, and so much more.Become a supporter and let out your inner Cyber Warrior with upcoming engagements and merch! Any support goes directly back into the production of the podcast and to provide our fellow warriors with meaningful connections and discussions.Bio Links:https://cyberwarriorstudios.bio.linkConnect with our guest(s):Patrick Gorman a.k.a InfosecPatLinkedIn: https://www.linkedin.com/in/infosecpatTwitter: https://twitter.com/infosecpatPodcast Version: Available on all major platforms! (Google, Apple, Spotify, Amazon, iHeart Radio, and more)Podcast RSS: https://feeds.buzzsprout.com/1315237.rssHow to Support:Buy Me A Beer: https://www.buymeacoffee.com/CyberWarriorPayPal: https://paypal.me/cyberwarriorstudiosCashApp: $CyberWarriorStudiosWebsite:https://www.cyberwarriorstudios.comHow to connect with Cyber Warrior:Twitch: https://twitch.tv/CyberWarriorStudiosTwitter: https://www.twitter.com/CyberWarriorSt1Discord: https://discord.gg/eCSRzM6mJfDiscord Servers:Hacker Valley Media - https://hackervalley.com/discordRaices Cyber - https://bio.link/raicescyKevTech IT - https://discord.gg/UPmXKjX2Gu***Security Happy Hour***#TheCyberWarrior#securityhappyhour#cyberwarriorstudios#wholecyberhumaninitiative#education#scholarship#MentalHealth#DontQuit#YouGotThis#cybersecurity#cyberwarrior#informationsecurity#CyberSupplyDrop#BlueTeam#RedTeam#ContentCreation#Leadership#SecurityMonitoring#SecurityOnion#EnterpriseSecurityMonitoring#Cybersecurity#Infosec#Cyber#hacking#hackers#hacker#careertransitionSupport the showMerch: https://cyberwarriorstudios.com/storeYoutube: https://youtube.cyberwarriorstudios.comTwitch: https://twitch.tv/CyberWarriorStudiosTwitter: @CyberWarriorSt1Discord: https://discord.gg/eCSRzM6mJf

Security Happy Hour
Cyber Pathways

Security Happy Hour

Play Episode Listen Later Jan 10, 2023 62:18


All journies into cybersecurity are different. The question is are you willing to put in the work to make your dreams come true? Become a supporter and let out your inner Cyber Warrior with upcoming engagements and merch! Any support goes directly back into the production of the podcast and to provide our fellow warriors with meaningful connections and discussions.Bio Links:https://cyberwarriorstudios.bio.linkConnect with our guest(s):Matt MarksTwitter: https://www.twitter.com/gryphoninfosecLinkedIn: https://www.linkedin.com/in/matt-marksPodcast Version: Available on all major platforms! (Google, Apple, Spotify, Amazon, iHeart Radio, and more)Podcast RSS: https://feeds.buzzsprout.com/1315237.rssHow to Support:Buy Me A Beer: https://www.buymeacoffee.com/CyberWarriorPayPal: https://paypal.me/cyberwarriorstudiosCashApp: $CyberWarriorStudiosWebsite:https://www.cyberwarriorstudios.comHow to connect with Cyber Warrior:Twitch: https://twitch.tv/CyberWarriorStudiosTwitter: https://www.twitter.com/CyberWarriorSt1Discord: https://discord.gg/eCSRzM6mJfDiscord Servers:Hacker Valley Media - https://hackervalley.com/discordRaices Cyber - https://bio.link/raicescyKevTech IT - https://discord.gg/UPmXKjX2Gu***Security Happy Hour***#TheCyberWarrior#securityhappyhour#cyberwarriorstudios#wholecyberhumaninitiative#education#scholarship#MentalHealth#DontQuit#YouGotThis#cybersecurity#cyberwarrior#informationsecurity#CyberSupplyDrop#BlueTeam#RedTeam#ContentCreation#Leadership#SecurityMonitoring#SecurityOnion#EnterpriseSecurityMonitoring#Cybersecurity#Infosec#Cyber#hacking#hackers#hacker#careertransitionSupport the showMerch: https://cyberwarriorstudios.com/storeYoutube: https://youtube.cyberwarriorstudios.comTwitch: https://twitch.tv/CyberWarriorStudiosTwitter: @CyberWarriorSt1Discord: https://discord.gg/eCSRzM6mJf

Security Happy Hour
No Degree No Problem

Security Happy Hour

Play Episode Listen Later Dec 10, 2022 66:15


College degrees have been a huge sticking point in terms of getting into many career fields. With the advancement of the internet and the wide variety of education out there both free and limited cost is a college degree even necessary to break into cybersecurity anymore?Become a supporter and let out your inner Cyber Warrior with upcoming engagements and merch! Any support goes directly back into the production of the podcast and to provide our fellow warriors with meaningful connections and discussions.Bio Links:https://cyberwarriorstudios.bio.linkConnect with our guest(s):Faith TinonetsanaTwitter: https://www.twitter.com/ftinos7LinkedIn: https://www.linkedin.com/in/faith-tinonetsana-048a7b1a2Podcast Version: Available on all major platforms! (Google, Apple, Spotify, Amazon, iHeart Radio, and more)Podcast RSS: https://feeds.buzzsprout.com/1315237.rssHow to Support:Buy Me A Beer: https://www.buymeacoffee.com/CyberWarriorPayPal: https://paypal.me/cyberwarriorstudiosCashApp: $CyberWarriorStudiosConnect with Liana McCrea aka GeecheeThreat:Twitter: https://www.twitter.com/GeecheeThreatLinkedIn: https://www.linkedin.com/in/geecheethreatDiscord Servers:Hacker Valley Media - https://hackervalley.com/discordRaices Cyber - https://bio.link/raicescyKevTech IT - https://discord.gg/UPmXKjX2Gu***Security Happy Hour***#TheCyberWarrior#securityhappyhour#cyberwarriorstudios#wholecyberhumaninitiative#education#scholarship#MentalHealth#DontQuit#YouGotThis#cybersecurity#cyberwarrior#informationsecurity#CyberSupplyDrop#BlueTeam#RedTeam#ContentCreation#Leadership#SecurityMonitoring#SecurityOnion#EnterpriseSecurityMonitoring#Cybersecurity#Infosec#Cyber#hacking#hackers#hacker#careertransitionSupport the showMerch: https://cyberwarriorstudios.com/storeYoutube: https://youtube.cyberwarriorstudios.comTwitch: https://twitch.tv/CyberWarriorStudiosTwitter: @CyberWarriorSt1Discord: https://discord.gg/eCSRzM6mJf

Security Happy Hour
Cyber Certifications

Security Happy Hour

Play Episode Listen Later Dec 9, 2022 62:10


We are talking cybersecurity certifications again because everyone has a different view and challenges they face.Become a supporter and let out your inner Cyber Warrior with upcoming engagements and merch! Any support goes directly back into the production of the podcast and to provide our fellow warriors with meaningful connections and discussions.Bio Links:https://cyberwarriorstudios.bio.linkConnect with our guest(s):Ricardo VasquezLinkedIn: https://www.linkedin.com/in/rvasquez1076Podcast Version: Available on all major platforms! (Google, Apple, Spotify, Amazon, iHeart Radio, and more)Podcast RSS: https://feeds.buzzsprout.com/1315237.rssHow to Support:Buy Me A Beer: https://www.buymeacoffee.com/CyberWarriorPayPal: https://paypal.me/cyberwarriorstudiosCashApp: $CyberWarriorStudiosWebsite:https://www.cyberwarriorstudios.comHow to connect with Cyber Warrior:Twitch: https://twitch.tv/CyberWarriorStudiosTwitter: https://www.twitter.com/CyberWarriorSt1Discord: https://discord.gg/eCSRzM6mJfConnect with Liana McCrea aka GeecheeThreat:Twitter: https://www.twitter.com/GeecheeThreatLinkedIn: https://www.linkedin.com/in/geecheethreatDiscord Servers:Hacker Valley Media - https://hackervalley.com/discordRaices Cyber - https://bio.link/raicescyKevTech IT - https://discord.gg/UPmXKjX2Gu***Security Happy Hour***#TheCyberWarrior#securityhappyhour#cyberwarriorstudios#wholecyberhumaninitiative#education#scholarship#MentalHealth#DontQuit#YouGotThis#cybersecurity#cyberwarrior#informationsecurity#CyberSupplyDrop#BlueTeam#RedTeam#ContentCreation#Leadership#SecurityMonitoring#SecurityOnion#EnterpriseSecurityMonitoring#Cybersecurity#Infosec#Cyber#hacking#hackers#hacker#careertransitionSupport the showMerch: https://cyberwarriorstudios.com/storeYoutube: https://youtube.cyberwarriorstudios.comTwitch: https://twitch.tv/CyberWarriorStudiosTwitter: @CyberWarriorSt1Discord: https://discord.gg/eCSRzM6mJf

Security Happy Hour
Entry Level Careers & Learning

Security Happy Hour

Play Episode Listen Later Dec 4, 2022 67:22


Cybersecurity and IT are ever-evolving career fields. Hear from some of the people trying to break in and what they are seeing happen within the industry.Become a supporter and let out your inner Cyber Warrior with upcoming engagements and merch! Any support goes directly back into the production of the podcast and to provide our fellow warriors with meaningful connections and discussions.Bio Links:https://cyberwarriorstudios.bio.linkConnect with our guest(s):Henry EvansLinkedIn: https://www.linkedin.com/in/henry-evans/Jonathan GriffithLinkedIn: https://www.linkedin.com/in/jonathan-j-griffith/Podcast Version: Available on all major platforms! (Google, Apple, Spotify, Amazon, iHeart Radio, and more)Podcast RSS: https://feeds.buzzsprout.com/1315237.rssHow to Support:Buy Me A Beer: https://www.buymeacoffee.com/CyberWarriorPayPal: https://paypal.me/cyberwarriorstudiosCashApp: $CyberWarriorStudiosWebsite:https://www.cyberwarriorstudios.comHow to connect with Cyber Warrior:Twitch: https://twitch.tv/CyberWarriorStudiosTwitter: https://www.twitter.com/CyberWarriorSt1Discord: https://discord.gg/eCSRzM6mJfConnect with Liana McCrea aka GeecheeThreat:Twitter: https://www.twitter.com/GeecheeThreatLinkedIn: https://www.linkedin.com/in/geecheethreatDiscord Servers:Hacker Valley Media - https://hackervalley.com/discordRaices Cyber - https://bio.link/raicescyKevTech IT - https://discord.gg/UPmXKjX2Gu***Security Happy Hour***#TheCyberWarrior#securityhappyhour#cyberwarriorstudios#wholecyberhumaninitiative#education#scholarship#MentalHealth#DontQuit#YouGotThis#cybersecurity#cyberwarrior#informationsecurity#CyberSupplyDrop#BlueTeam#RedTeam#ContentCreation#Leadership#SecurityMonitoring#SecurityOnion#EnterpriseSecurityMonitoring#Cybersecurity#Infosec#Cyber#hacking#hackers#hacker#careertransitionSupport the showMerch: https://cyberwarriorstudios.com/storeYoutube: https://youtube.cyberwarriorstudios.comTwitch: https://twitch.tv/CyberWarriorStudiosTwitter: @CyberWarriorSt1Discord: https://discord.gg/eCSRzM6mJf

Security Happy Hour
From Pharmacy to Cyber

Security Happy Hour

Play Episode Listen Later Oct 26, 2022 63:07


Michelle "Misha" Malcolm is in school to transition from a career in pharmacy to cybersecurity. Join us as we discuss her incredible journey so far.Become a supporter and let out your inner Cyber Warrior with upcoming engagements and merch! Any support goes directly back into the production of the podcast and to provide our fellow warriors with meaningful connections and discussions.Bio Links:https://cyberwarriorstudios.bio.linkConnect with our guest(s):Michelle "Misha" MalcolmLinkedIn: https://www.linkedin.com/in/misha-malcolmPodcast Version: Available on all major platforms! (Google, Apple, Spotify, Amazon, iHeart Radio, and more)Podcast RSS: https://feeds.buzzsprout.com/1315237.rssHow to Support:Buy Me A Beer: https://www.buymeacoffee.com/CyberWarriorPayPal: https://paypal.me/cyberwarriorstudiosCashApp: $CyberWarriorStudiosWebsite:https://www.cyberwarriorstudios.comHow to connect with Cyber Warrior:TikTok: https://www.tiktok.com/@cyberwarriorstudiosTwitch: https://twitch.tv/CyberWarriorStudiosTwitter: https://www.twitter.com/CyberWarriorSt1Discord: https://discord.gg/eCSRzM6mJfReddit: https://www.reddit.com/r/CyberWarriorStudiosDiscord Servers:Hacker Valley Media - https://hackervalley.com/discordRaices Cyber - https://bio.link/raicescyKevTech IT - https://discord.gg/UPmXKjX2Gu***Security Happy Hour***#TheCyberWarrior#securityhappyhour#cyberwarriorstudios#wholecyberhumaninitiative#education#scholarship#MentalHealth#DontQuit#YouGotThis#cybersecurity#cyberwarrior#informationsecurity#CyberSupplyDrop#BlueTeam#RedTeam#ContentCreation#Leadership#SecurityMonitoring#SecurityOnion#EnterpriseSecurityMonitoring#Cybersecurity#Infosec#Cyber#hacking#hackers#hacker#careertransitionSupport the showMerch: https://cyberwarriorstudios.com/storeTwitch: https://twitch.tv/CyberWarriorStudiosTwitter: @CyberWarriorSt1Discord: https://discord.gg/eCSRzM6mJf

Security Happy Hour
From Air Ops to Cyber

Security Happy Hour

Play Episode Listen Later Oct 10, 2022 61:40


After leaving the Air Force, James Driscoll made the move to cybersecurity. Now looking for his first job he has built his skillset and worked with groups such as  @Cybersecurity Central and  @Jax S. - Outpost Gray to develop content. Become a supporter and let out your inner Cyber Warrior with upcoming engagements and merch! Any support goes directly back into the production of the podcast and to provide our fellow warriors with meaningful connections and discussions.Bio Links:https://cyberwarriorstudios.bio.linkConnect with our guest(s):James DriscollLinkedIn: https://www.linkedin.com/in/jdriscoll-76Podcast Version: Currently available on Spotify, Apple, Google, and Amazon Podcast.Podcast RSS: https://feeds.buzzsprout.com/1315237.rssHow to Support:Buy Me A Beer: https://www.buymeacoffee.com/CyberWarriorPayPal: https://paypal.me/cyberwarriorstudiosCashApp: $CyberWarriorStudiosDiscord Servers:Hacker Valley Media - https://hackervalley.com/discordRaices Cyber - https://bio.link/raicescyKevTech IT - https://discord.gg/UPmXKjX2Gu***Security Happy Hour***#TheCyberWarrior#securityhappyhour#cyberwarriorstudios#wholecyberhumaninitiative#education#scholarship#MentalHealth#DontQuit#YouGotThis#cybersecurity#cyberwarrior#informationsecurity#CyberSupplyDrop#BlueTeam#RedTeam#ContentCreation#Leadership#SecurityMonitoring#SecurityOnion#EnterpriseSecurityMonitoring#Cybersecurity#Infosec#Cyber#hacking#hackers#hackerSupport the showMerch: https://cyberwarriorstudios.com/storeTwitch: https://twitch.tv/CyberWarriorStudiosTwitter: @CyberWarriorSt1Discord: https://discord.gg/eCSRzM6mJf

Security Happy Hour
Whole Cyber Human Initiative

Security Happy Hour

Play Episode Listen Later Sep 23, 2022 67:30


Whole Cyber Human Initiative launched a 25k fundraiser. The proceeds go towards the procurement of up to 50 $400.00 cert test vouchers that will be awarded in a first-of-its-kind certification Scholarship and through our Community Challenge. We have a direct donate option at https://www.paypal.com/donate/?hosted_button_id=CB4LWDGUELC3YWe are listed on Amazon SmileYou can purchase any of our swag or coffees.And,Companies can find us on Brevity Each of these options feed the scholarship funds directly. Become a supporter and let out your inner Cyber Warrior with upcoming engagements and merch! Any support goes directly back into the production of the podcast and to provide our fellow warriors with meaningful connections and discussions.Bio Links:https://cyberwarriorstudios.bio.linkConnect with our guests:Paul CummingsLinkedIn: https://www.linkedin.com/in/paul-cummings/Website: https://www.wholecyberhumaninitiative.org/Podcast Version: Currently available on Spotify, Apple, Google, and Amazon Podcast.Podcast RSS: https://feeds.buzzsprout.com/1315237.rssHow to Support:Buy Me A Beer: https://www.buymeacoffee.com/CyberWarriorGoFundMe: https://www.gofundme.com/cyber-warrior-studiosPayPal: https://paypal.me/cyberwarriorstudiosCashApp: $CyberWarriorStudiosWebsite:https://www.cyberwarriorstudios.comHow to connect with Cyber Warrior:TikTok: https://www.tiktok.com/@cyberwarriorstudiosTwitch: https://twitch.tv/CyberWarriorStudiosTwitter: https://www.twitter.com/CyberWarriorSt1Discord: https://discord.gg/eCSRzM6mJfBlog: https://blog.cyberwarriorstudios.comReddit: https://www.reddit.com/r/CyberWarriorStudiosDiscord Servers:Hacker Valley Media - https://hackervalley.com/discordRaices Cyber - https://bio.link/raicescyKevTech IT - https://discord.gg/UPmXKjX2Gu***Security Happy Hour***#TheCyberWarrior#securityhappyhour#cyberwarriorstudios#wholecyberhumaninitiative#education#scholarship#MentalHealth#DontQuit#YouGotThis#cybersecurity#cyberwarrior#informationsecurity#CyberSupplyDrop#BlueTeam#RedTeam#ContentCreation#Leadership#SecurityMonitoring#SecurityOnion#EnterpriseSecurityMonitoring#Cybersecurity#Infosec#Cyber#hacking#hackers#hackerSupport the show

Security Happy Hour
The Cyber Queens Podcast

Security Happy Hour

Play Episode Listen Later Sep 2, 2022 75:11


From red team to blue team and everything in between, The Cyber Queens are a formidable group. This week we talk to the ladies of The Cyber Queens podcast. Their why, how, and what makes them tick!Tonight's guests are Maril Vernon, Erika Eakins, and Nathalie BakerBecome a supporter and let out your inner Cyber Warrior with upcoming engagements and merch! Any support goes directly back into the production of the podcast and to provide our fellow warriors with meaningful connections and discussions.Bio Links:https://cyberwarriorstudios.bio.linkConnect with our guests:The Cyber Queens Podcast:Twitter: https://twitter.com/thecyberqueensInstagram: https://instagram.com/thecyberqueensWebsite: https://www.cyberqueenspodcast.comMaril VernonTwitter: https://twitter.com/shewhohacksLinkedIn: https://www.linkedin.com/in/marilvernonErika EakinsTwitter: https://twitter.com/eakinserikaLinkedIn: https://linkedin.com/in/eeakinsNathalie BakerLinkedIn: https://linkedin.com/in/nathaliebakerPodcast Version: Currently available on Spotify, Apple, Google, and Amazon Podcast.Podcast RSS: https://feeds.buzzsprout.com/1315237.rssHow to Support:Buy Me A Beer: https://www.buymeacoffee.com/CyberWarriorGoFundMe: https://www.gofundme.com/cyber-warrior-studiosPayPal: https://paypal.me/cyberwarriorstudiosCashApp: $CyberWarriorStudiosWebsite:https://www.cyberwarriorstudios.comHow to connect with Cyber Warrior:TikTok: https://www.tiktok.com/@cyberwarriorstudiosTwitch: https://twitch.tv/CyberWarriorStudiosTwitter: https://www.twitter.com/CyberWarriorSt1Discord: https://discord.gg/eCSRzM6mJfBlog: https://blog.cyberwarriorstudios.comReddit: https://www.reddit.com/r/CyberWarriorStudiosDiscord Servers:Hacker Valley Media - https://hackervalley.com/discordRaices Cyber - https://bio.link/raicescyKevTech IT - https://discord.gg/UPmXKjX2Gu***Security Happy Hour***#TheCyberWarrior#securityhappyhour#cyberwarriorstudios#MentalHealth#DontQuit#YouGotThis#cybersecurity#cyberwarrior#informationsecurity#CyberSupplyDrop#BlueTeam#RedTeam#ContentCreation#Leadership#SecurityMonitoring#SecurityOnion#EnterpriseSecurityMonitoring#Cybersecurity#Infosec#Cyber#hacking#hackers#hacker#womenincyber#womenincybersecuritySupport the show

Security Happy Hour
Mental Health & Keeping in Touch

Security Happy Hour

Play Episode Listen Later Jun 14, 2022 67:46


One of the most important and neglected aspects of our careers and lives is Mental Health. So today we will be sitting down and talking about it and how Keeping in Touch with those that mean the most can help keep you grounded.Tonight's guest is Brad LiggettBecome a supporter and let out your inner Cyber Warrior with upcoming engagements and merch! Any support goes directly back into the production of the podcast and to provide our fellow warriors with meaningful connections and discussions.Connect with our guests:Brad Liggetthttps://twitter.com/brad_liggettLinkedIn: https://linkedin.com/in/bradliggett/Bio Links:https://cyberwarriorstudios.bio.linkPodcast Version: Currently available on Spotify, Apple, Google, and Amazon Podcast.Podcast RSS: https://feeds.buzzsprout.com/1315237.rssHow to Support:Buy Me A Beer: https://www.buymeacoffee.com/CyberWarriorGoFundMe: https://www.gofundme.com/cyber-warrior-studiosPatreon: https://www.patreon.com/CyberWarriorStudiosCashApp: $CyberWarriorStudiosWebsite:https://www.cyberwarriorstudios.comHow to connect with Cyber Warrior:TikTok: https://www.tiktok.com/@cyberwarriorstudiosTwitch: https://twitch.tv/CyberWarriorStudiosTwitter: https://www.twitter.com/CyberWarriorSt1Discord: https://discord.gg/eCSRzM6mJfBlog: https://blog.cyberwarriorstudios.comReddit: https://www.reddit.com/r/CyberWarriorStudiosCyber Supply Drop:https://www.cybersupplydrop.org***Security Happy Hour***#TheCyberWarrior#securityhappyhour#cyberwarriorstudios#MentalHealth#DontQuit#YouGotThis#cybersecurity#cyberwarrior#informationsecurity#CyberSupplyDrop#BlueTeam#RedTeam#ContentCreation#Leadership#SecurityMonitoring#SecurityOnion#EnterpriseSecurityMonitoring#Cybersecurity#Infosec#Cyber#hacking#hackers#hacker#security#cyberawareness#securitychampions#Networking#SocialNetworks#Careers#Volunteer#TransitionSupport the show

Security Happy Hour
Security Happy Hour: Helping Veterans & Veteran Spouses

Security Happy Hour

Play Episode Listen Later Apr 3, 2022 65:02


This week on Security Happy Hour we are discussing Helping #Veterans and #Veteran Spouses.Tonight's guest is Rebecca Ford.Become a supporter and let out your inner Cyber Warrior with upcoming engagements and merch! Any support goes directly back into the production of the podcast and to provide our fellow warriors with meaningful connections and discussions.Connect with our guests:Rebecca Ford: Twitter: https://twitter.com/cybersquarepegVeteran Linkshttps://www.hireheroesusa.org/Bio Links:https://cyberwarriorstudios.bio.linkPodcast Version: Is currently available on Spotify, Apple, Google, and Amazon Podcast.Podcast RSS: https://feeds.buzzsprout.com/1315237.rssHow to Support:Buy Me A Beer: https://www.buymeacoffee.com/CyberWarriorGoFundMe: https://www.gofundme.com/cyber-warrior-studiosPatreon: https://www.patreon.com/CyberWarriorStudiosCashApp: $CyberWarriorStudiosWebsite:https://www.cyberwarriorstudios.comHow to connect with Cyber Warrior:TikTok: https://www.tiktok.com/@cyberwarriorstudiosTwitch: https://twitch.tv/CyberWarriorStudiosTwitter: https://www.twitter.com/CyberWarriorSt1Discord: https://discord.gg/eCSRzM6mJfBlog: https://blog.cyberwarriorstudios.comReddit: https://www.reddit.com/r/CyberWarriorStudiosCyber Supply Drop:https://www.cybersupplydrop.org***Security Happy Hour***#cybersecurity#securityhappyhour#cyberwarriorstudios#cyberwarrior#informationsecurity#CyberSupplyDrop#BlueTeam#RedTeam#ContentCreation#Leadership#socialengineering#physicalpentesting#Cybersecurity#Infosec#Cyber#hacking#hackers#hacker#security#cyberawareness#securitychampions#Networking#SocialNetworks#Careers#womenintech#womenincyber#noobs#timemanagementSupport the show (https://www.patreon.com/cyberwarriorstudios)

InfosecTrain
SOC Analyst Online Training Course

InfosecTrain

Play Episode Listen Later Feb 9, 2022 6:17


The SOC Analyst training curriculum has been carefully crafted to provide aspiring and present SOC Analysts with a thorough knowledge of SOC operations and processes. Learn to recognize and respond to information security incidents, create and track security events like alerts, and conduct security investigations. Learn tools like Splunk and Security Onion. For more Detail : https://www.infosectrain.com/courses/soc-analyst-training/

The Homelab Show
The Homelab Show Ep. 42 – Security Onion

The Homelab Show

Play Episode Listen Later Jan 21, 2022 44:51


https://thehomelab.show/ The sponsor for today’s episode https://www.linode.com/homelabshow https://lawrencesystems.com/https://www.learnlinux.tv/

security onion
Paul's Security Weekly TV
Peel Back the Layers of Your Enterprise with Security Onion 2 - Doug Burks - PSW #717

Paul's Security Weekly TV

Play Episode Listen Later Nov 5, 2021 66:19


Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. We've got a new container-based platform that is more flexible, more powerful, and more scalable than ever before. Join us to see how you can peel back the layers of your enterprise and make your adversaries cry!   Segment Resources: https://securityonion.net https://github.com/Security-Onion-Solutions/securityonion https://securityonion.net/discuss   Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw717

enterprise layers peel burks security onion segment resources
Paul's Security Weekly (Video-Only)
Peel Back the Layers of Your Enterprise with Security Onion 2 - Doug Burks - PSW #717

Paul's Security Weekly (Video-Only)

Play Episode Listen Later Nov 4, 2021 66:19


Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. We've got a new container-based platform that is more flexible, more powerful, and more scalable than ever before. Join us to see how you can peel back the layers of your enterprise and make your adversaries cry!   Segment Resources: https://securityonion.net https://github.com/Security-Onion-Solutions/securityonion https://securityonion.net/discuss   Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw717

enterprise layers peel burks security onion segment resources
Paul's Security Weekly (Podcast-Only)
Funny Stories - PSW #717

Paul's Security Weekly (Podcast-Only)

Play Episode Listen Later Nov 4, 2021 215:42


This week, we kick off the show with an interview featuring Doug Burks, CEO of Security Onion Solutions, who joins to discuss Peel Back the Layers of Your Enterprise with Security Onion 2! Then, I'm going to continue guiding you through Scanning For Default Creds With Python!! In the Security News: LOLbins that make you LOL, over exposing your medical records, Shrootless gets past SIP, 73.6% of statistics are made up and other such lies, we love Signal, if an 0day drops on the Internet how many people have it?, fake Harvard students, uses for an Apple cleaning cloth, Bidi override characters, who owns my house?, who owns your printer?, and the return of Clippy!   Show Notes: https://securityweekly.com/psw717 Segment Resources: https://securityonion.net https://github.com/Security-Onion-Solutions/securityonion https://securityonion.net/discuss   Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

Paul's Security Weekly
Funny Stories - PSW #717

Paul's Security Weekly

Play Episode Listen Later Nov 4, 2021 215:42


This week, we kick off the show with an interview featuring Doug Burks, CEO of Security Onion Solutions, who joins to discuss Peel Back the Layers of Your Enterprise with Security Onion 2! Then, I'm going to continue guiding you through Scanning For Default Creds With Python!! In the Security News: LOLbins that make you LOL, over exposing your medical records, Shrootless gets past SIP, 73.6% of statistics are made up and other such lies, we love Signal, if an 0day drops on the Internet how many people have it?, fake Harvard students, uses for an Apple cleaning cloth, Bidi override characters, who owns my house?, who owns your printer?, and the return of Clippy!   Show Notes: https://securityweekly.com/psw717 Segment Resources: https://securityonion.net https://github.com/Security-Onion-Solutions/securityonion https://securityonion.net/discuss   Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

Paul's Security Weekly TV
Up & Running With Security Onion - PSW #713

Paul's Security Weekly TV

Play Episode Listen Later Oct 9, 2021 41:33


There are many options to choose from when setting up The Security Onion. The use cases are vast, including a NIDS (Zeek, Suricata), HIDS (Beats, Wazuh, osquery) and standalone instances for a SOC workstation and static analysis. I really like SO as a platform to collect all kinds of data from the network and from your systems (some even use the word XDR).   Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw713

running soc xdr suricata security onion
Paul's Security Weekly (Video-Only)
Up & Running With Security Onion - PSW #713

Paul's Security Weekly (Video-Only)

Play Episode Listen Later Oct 8, 2021 41:33


There are many options to choose from when setting up The Security Onion. The use cases are vast, including a NIDS (Zeek, Suricata), HIDS (Beats, Wazuh, osquery) and standalone instances for a SOC workstation and static analysis. I really like SO as a platform to collect all kinds of data from the network and from your systems (some even use the word XDR).   Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw713

running soc xdr suricata security onion
Security Happy Hour
Security Happy Hour: Enterprise Security Monitoring & Security Onion

Security Happy Hour

Play Episode Listen Later Sep 27, 2021 61:52


This week on Security Happy Hour we are discussing Enterprise Security Monitoring and Security Onion. An exciting episode for sure as Security Onion is one of the premier open source monitoring solutions that allow for blue teamers and red teamers to run an entire lab environment and detect any breaches or malicious behavior.Tonight's guest is Principal Engineer of Security Onion Wes Lambert.Become a supporter and let out your inner Cyber Warrior with upcoming engagements and merch! Any support goes directly back into the production of the podcast and to provide our fellow warriors meaningful connections and discussions.Connect with our guests:Wes Lambert: Twitter: https://twitter.com/therealwlambertBio Links:https://cyberwarriorstudios.bio.linkPodcast Version: Is currently available on Spotify, Apple, Google, and Amazon Podcast.Podcast RSS: https://feeds.buzzsprout.com/1315237.rssHow to Support:Buy Me A Beer: https://www.buymeacoffee.com/CyberWarriorGoFundMe: https://www.gofundme.com/cyber-warrior-studiosPatreon: https://www.patreon.com/CyberWarriorStudiosCashApp: $CyberWarriorStudiosWebsite:https://www.cyberwarriorstudios.comHow to connect with Cyber Warrior:TikTok: https://www.tiktok.com/@cyberwarriorstudiosTwitch: https://twitch.tv/CyberWarriorStudiosTwitter: https://www.twitter.com/CyberWarriorSt1Discord: https://discord.gg/eCSRzM6mJfBlog: https://blog.cyberwarriorstudios.comReddit: https://www.reddit.com/r/CyberWarriorStudiosCyber Supply Drop:https://www.cybersupplydrop.org***Security Happy Hour***#cybersecurity#securityhappyhour#cyberwarriorstudios#cyberwarrior#informationsecurity#CyberSupplyDrop#BlueTeam#RedTeam#ContentCreation#Leadership#SecurityMonitoring#SecurityOnion#EnterpriseSecurityMonitoring#Cybersecurity#Infosec#Cyber#hacking#hackers#hacker#security

Black Hills Information Security
Webcast: No SPAN Port? No Tap? No Problem!

Black Hills Information Security

Play Episode Listen Later Jul 23, 2021 65:49


We've been having a problem with people that want to play with Security Onion or RITA at home. If a home router does not have a mirror port it can be difficult to try cool/free network monitoring tools. Sure, one could buy another router that has those features. But it is far easier to not […] The post Webcast: No SPAN Port? No Tap? No Problem! appeared first on Black Hills Information Security.

port no problem span webcasts black hills information security security onion
SECTION 9 Cyber Security
Part 1: What did John say? - 203

SECTION 9 Cyber Security

Play Episode Listen Later Jun 21, 2021 23:44


In our last episode, we interviewed John Strand of Black Hills Information Security. Now it's time to analyze what he said. For this episode, we're looking at the technical side of the interview. We're saving the training portion for another episode. LINKS1. The Essential 8 from Australia 2. DeepBlueCLI3. Sysmon 4. Elastic Stack - ELK5. Security Onion 6. LogonTracer 7. sigma 8. JPCERT Tools 9. JPCERT: Tool Analysis Results Sheet FIND US ON1. Facebook2. Twitter - DamienHull

australia essential john strand black hills information security sysmon security onion
The Security Podcast of Silicon Valley
Wesley Belleman of California Air National Guard and Palo Alto Networks: Security Operations Center from Military and Private Industry Perspectives

The Security Podcast of Silicon Valley

Play Episode Listen Later Jun 17, 2021 47:32


An interview with Wesley Belleman, Cyber Warfare Operator at the California Air National Guard and System Engineer at Palo Alto Networks, and his journey through Security Operations in the United Space Space Force.   In this episode, we dive into what a SOC is, how new technology changes our ability to respond to threats, and what the open problems are still open. We explore the cultural differences between civilian and military security operations and discuss various open-source projects such as Security Onion or MITRE Att&ck that can be used to build your own SOC.    So what will the future of SOC's look like? Wes echo's Anton Chuvakin predictions that SOC's will be entirely automated, likely within our lifetimes, but not soon.

Phoenix Cast
Peeling Back the Cybersecurity Onion with Doug Burks

Phoenix Cast

Play Episode Listen Later Apr 12, 2021 75:05


In this episode of Phoenix Cast, hosts John, Kyle and Rich talk to special guest Doug Burks, the founder and CEO of Security Onion, a free and open source Linux distribution for threat hunting, enterprise security monitoring, and log management. Doug started security onion in 2008 as a means for helping people "peel back the layers of their networks and make their adversaries cry." Share your thoughts with us on Twitter: @USMC_TFPhoenix Follow MARFORCYBER, MCCOG, MCCYWG, and the Network Battalions on Twitter, LinkedIn, Facebook, and YouTube. Leave your review on Apple Podcasts.

BLUEPRINT
Playbook for Security Onion

BLUEPRINT

Play Episode Listen Later Mar 30, 2021 32:52 Transcription Available


Driving consistency and maintaining a high standard for alert response is a problem all SOCs must face, but how? In this episode, Josh Brower describes his efforts to combine automated detection signature deployment and use case database management into a single, easy to use app for Security Onion. Whether you use Security Onion or not, this episode dives into the design principles and workflow Josh used when designing the new open-source Playbook app and there’s something to learn from it for everyone on the Blue Team.Our Guest - Josh BrowerJosh Brower has been crashing computers since his teens, and now feels fortunate to be doing it professionally. He has spent the last 12 years focusing on InfoSec, particularly network and endpoint detection. He also enjoys teaching around InfoSec issues, especially to non-technical learners - helping them to understand how their actions in the digital world have real-world consequences, as well as how to proactively reduce the risk.Follow JoshTwitter: @DefensiveDepthLinkedIn: /in/joshbrower Web: https://defensivedepth.comSupport for the Blueprint podcast comes from the SANS InstituteAre you looking for the best in-depth training for your cyber defense team? Look no further than SANS blue team curriculum courses!Whether you focus on network or host data, Windows or Linux, or even specialize in open source intel, SIEM, SOC, or defensive architecture, the SANS Blue Team curriculum has the course for you. From long-time classics like SEC503 Network Intrusion Detection to the newer SEC530 Defensible Security Architecture and Engineering and SEC487 Open Source Intelligence Gathering - we've got you covered, no matter what your specialty.With an extensive archive of free webcasts on the SANS site, and free online demos available for most courses, you can easily check out the SANS blue team catalog and see which course is the best fit for you and your team.Check out the constantly growing list of available courses at sansurl.com/blueteamopsFollow SANS Cyber Defense: Twitter | LinkedIn | YouTubeFollow John Hubbard: Twitter | LinkedIn

Cybersecurity FOREVER
#158: Can You Build A Home Network Security Monitoring?

Cybersecurity FOREVER

Play Episode Listen Later Jan 5, 2021 8:13


Today I will discuss: 1. What are the requirements for Networking Security Monitoring? 2. What is Security Onion? 3. What are the core components of Security Onion? Watch

network security security monitoring security onion
SECTION 9 Cyber Security
Wireshark, Security Onion and Logging - 156

SECTION 9 Cyber Security

Play Episode Listen Later May 4, 2020 26:36


Its been an interesting week. Wireshark saved me at work. Wasn’t expecting that. I’ve been using the Security Onion training. Learning how to set it up and install test data. I’ve also realized that a security lab needs evil. How do you look for evil if you don’t have any?LINKS1. Security Onion2. Windows logging Cheat Sheets3. Black Hills - How to Build a Home LabFIND US ON1. Facebook2. Twitter - DamienHull

7 Minute Security
7MS #270: IDS on a Budget - Part 4

7 Minute Security

Play Episode Listen Later Aug 2, 2017 12:30


I spent a bunch of time with Security Onion the last couple week's and have been lovin' it! I ran the install, took all the defaults, ran the updates, and pretty much just let it burn in on my prod (home) environment. After a few days, I went back to check the Security Onion dashboard to check the alerts. There was a bunch of benign stuff (computers pinging each other, Dropbox broadcasting to the network) but also a couple interesting finds - SO caught one of my VMs downloading (intentionally) Invoke-Mimikatz. The dashboard allows you to see transcripts of file downloads like this, as well as a tool called Network Miner to extract a copy of the downloaded file for further analysis. One thing the SO didn't pick up on was the DNS-based C2 tunnel I setup on a test victim client. However, it turns out RITA works great for exactly this type of analysis - it reported the huge number of DNS requests from my victim client to the C2 server. Very helpful info for an incident response situation!

7 Minute Security
7MS #268: IDS on a Budget - Part 3

7 Minute Security

Play Episode Listen Later Jul 19, 2017 12:09


Been having a blast working with the beta branch of the Sweet Security project and it anxious to try the latest fixes of the beta branch. Give it a look! I also spent a lot of time the last few nights playing with Security Onion and love it. After zipping through the install wizard and hitting reboot a few times you're pretty much good to go. A few recommendations I'd make after those initial reboots though: Run the soup command to update Security Onion with all the latest packages Use ufw to adjust the internal firewall to allow management from ports other than SSH (which is already preconfigured) On a side note, I think you might have to have your vnic in VMWare set to promiscuous mode in order to allow proper network sniffing. Do a wget http://testmyids.com to ensure Security Onion alerts are coming in the squil dashboard security alerts are pouring in. Also, check out this article for some handy tips on threat hunting with Bro. Next up on my "test this out list" is to setup DNS tunneling to a Digital Ocean droplet I setup, and see if the onion picks up on that, or if I can at least get warned somehow about a high amount of DNS traffic.

7 Minute Security
7MS #266: IDS on a Budget - Part 2

7 Minute Security

Play Episode Listen Later Jul 13, 2017 10:41


This week I've continued to play with the awesome Sweet Security IDS solution you can throw on a Raspberry Pi 3. A big update to share is that there is a beta branch which has some cool new features, such as the ability to break the Bro + ELK stack across multiple machines. I also lost a lot of sleep these last few days playing with Security Onion and will do a future episode focusing only on that!

budget raspberry pi security onion
Source Code Podcast
Source Code S1: Episode 2 - Doug Burks

Source Code Podcast

Play Episode Listen Later Apr 13, 2017 59:38


This week, my good friend Doug Burks joins us. Doug is most widely known for being the creator of the Security Onion Linux distribution that helps you peel back the layers of your network and make your adversaries cry. In this episode we talk about the origin of Security Onion, the reality check in college that helped turn Doug into one of the most disciplined and hard-working people I know, and his part in helping turn Augusta into the information security capital of the south.

source code burks security onion
Shoestring Networks Tech Tip Podcast

An IDS is one of the most valuable tools we use to secure small business networks. What is an IDS? Are they still useful? How can you use one in your business? We’ll answer these questions in this episode of the Tech Tip Podcast. Links Security Onion Web Site (From the web site) Security Onion ...read more The post 30: IDS Is Not Dead appeared first on Shoestring Networks.

ids security onion
DEF CON 23 [Audio] Speeches from the Hacker Convention
Chris Sistrunk - NSM 101 for ICS - 101 Track

DEF CON 23 [Audio] Speeches from the Hacker Convention

Play Episode Listen Later Sep 22, 2015


Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Chris-Sistrunk-NSM-101-for-ICS.pdf NSM 101 for ICS Chris Sistrunk Sr. ICS Security Consultant, FireEye Is your ICS breached? Are you sure? How do you know? The current state of security in Industrial Control Systems is a widely publicized issue, but fixes to ICS security issues are long cycle, with some systems and devices that will unfortunately never have patches available. In this environment, visibility into security threats to ICS is critical, and almost all of ICS monitoring has been focused on compliance, rather than looking for indicators/evidence of compromise. The non-intrusive nature of Network Security Monitoring (NSM) is a perfect fit for ICS. This presentation will show how NSM should be part of ICS defense and response strategy, various options for implementing NSM, and some of the capabilities that NSM can bring to an ICS security program. Free tools such as Security Onion, Snort IDS, Bro IDS, NetworkMiner, and Wireshark will be used to look at the ICS environment for anomalies. It will be helpful if attendees have read these books (but they aren't required): The Cuckoo's Egg by Cliff Stoll, The Practice of Network Security Monitoring by Richard Bejtlich, and Applied Network Security Monitoring by Chris Sanders and Jason Smith. Chris Sistrunk is a Senior Consultant at Mandiant, focusing on cyber security for industrial control systems (ICS) and critical infrastructure. Prior to joining Mandiant, Chris was a Senior Engineer at Entergy (over 11 years) where he was the Subject Matter Expert (SME) for SCADA systems. He has 10 years of experience in SCADA systems with tasks such as standards development, system design, database configuration, testing, commissioning, troubleshooting, and training. He was the co-overseer of the SCADA, relay, and cyber security labs at Entergy for 6 years. Chris has been working with Adam Crain of Automatak on Project Robus, an ICS protocol fuzzing project that has found and helped fix many implementation vulnerabilities in DNP3, Modbus, and Telegyr 8979. Chris helped organize the first ICS Village, which debuted at DEF CON 22. He is a Senior Member of IEEE, Mississippi Infragard President, member of the DNP Users Group, and also is a registered PE in Louisiana. He holds a BS in Electrical Engineering and MS in Engineering and Technology Management from Louisiana Tech University. Chris also founded and organizes BSidesJackson, Mississippi's only cyber security conference. Twitter: @chrissistrunk https://www.facebook.com/chrissistrunk

Exploring Information Security Archive 1
What is BSides Augusta?

Exploring Information Security Archive 1

Play Episode Listen Later Aug 24, 2015 33:22


2015 will be the third year for the security conference and it looks to be even bigger and better than last year. This year the conference features a two blue team tracks, a red team track, CTF challenge, a lock pick village, and much more. Doug also talked about his own conference that leads into BSides Augusta, the Security Onion conference. BSides Augusta is sold out, but the Security Onion conference still has tickets available.

b sides ctf security onion
Brakeing Down Security Podcast
2015-023_Get to know a Security Tool: Security Onion!

Brakeing Down Security Podcast

Play Episode Listen Later May 25, 2015 37:10


Having a more secure network by deploying tools can be no easy task. This week, we show you a tool, Security Onion, that can give you an IDS and log analysis tool in less than 20 minutes.  http://blog.securityonion.net/p/securityonion.html

TAGTV Online - TAG Radio
Doug Burks, Security Onion Solutions Founder

TAGTV Online - TAG Radio

Play Episode Listen Later Dec 18, 2014 19:04


121914 Burks

founders burks security onion
Paul's Security Weekly
Tonya Bacam, Security Onion - Episode 279 - March 8, 2012

Paul's Security Weekly

Play Episode Listen Later Mar 14, 2012 64:26


Interview with SANS instructor & course author Tanya Baccam and Guest Tech Segment with Doug Burk on Security Onion

interview security hacking security weekly security onion
SecuraBit
SecuraBit Episode 38 – Classic Securabit, Lots of Rambling, Low Content

SecuraBit

Play Episode Listen Later Aug 30, 2009 34:07


SecuraBit Episode 38 – Classic Securabit, Lots of Rambling, Low Content Louisville Metro InfoSec Conference in Louisville, KY October 8, 2009 8am - 5pm Sponsored by the local ISSA Chapter Some of speakers at the event include: John Strand Lee Kushner Scott Moulton Adrian "IronGeek" Crenshaw http://www.louisvilleinfosec.com/ Presentations are planed to be posted online afterwards. If you wish to attend the conference you can use the discount code of "geek seat" to get $20 off registration Round Table Topic: Who should be responsible for patching? Infrastructure or Security? There is a conversation about the new Snow Leopard for Mac and Macs mail. A brief discussion about Helix, Security Onion, and Splunk 4. Join us in IRC at irc.freenode.net #securabit Hosts: Anthony Gartner – http://www.anthonygartner.com – @anthonygartner Chris Gerling – http://www.chrisgerling.com – @hak5chris Christopher Mills – http://www.packetsense.net – @thechrisam Andrew Borel – @andrew_secbit Guest: Brian Blankenship  - chair ( a ) louisvilleinfosec ( dot ) com Links: Louisville Metro InfoSec Conference - http://www.louisvilleinfosec.com/ Security Onion - http://securityonion.blogspot.com/ Splunk 4 - http://www.splunk.com/view/splunk-4-features/SP-CAAAEVR

Network Security with KevTechify on the Cisco Certified Network Associate (CCNA)
Security Tools, Platforms, and Services - Mitigating Threats - Network Security - KevTechify | Podcast 10

Network Security with KevTechify on the Cisco Certified Network Associate (CCNA)

Play Episode Listen Later Jan 1, 1970 12:36


Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.In this episode we are going to look at Security Tools, Platforms, and Services.We will be discussing The Security Onion and The Security Artichoke, Security Testing Tools, Data Security Platforms, Cisco SecureX Demonstration, and Security Services.Thank you so much for listening to this episode of my series on Network Security.Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.http://KevTechify.com***********************************Network Security v1Episode 3 - Mitigating ThreatsPart C- Security Tools, Platforms, and ServicesPodcast Number: 10