Télécommunications

Cyber Security Incident Response – How SOC Responds, See LIVE

BlackPerl Presents to you the very FIRST, Cyber Security Incident Response Documentary which is based on a True Cyber Security Incident. We are releasing the full documentary here. In the Documentary, we have tried to show you A full demonstration of a P1 Incident Response. How did we respond, how did we triage and how did we perform from Forensic Level to find the RCA.

The Incident involves a Cyber Phishing, Account Forgery, Money Laundering, Domain Impersonation and many more. And the Investigation involves from an email to Security Operations Team from Geography IT Team to the very angle of Forensic Acquisition, Email Analysis, SIEM Hunt, Legal Notification, Customer Communication and a lot!!

We have tried to bring the whole incident in a small cinematic episode and tried to show you what actually happens in a real Security Operations centre. And this is damn reality!!

So, I hope you enjoy the show and Stick around to BlackPerl for more such exciting Episodes. You can learn something with enjoyment and a real feel of being into Security Operations Centre!!

I would like to THANK everyone who has worked with me to put together the episode and storyline. This Episode is an outcome of 100s of hours of post production and pre-production cuts where we could sync virtually and done the screen-play!!

Hope you Enjoy it!! Let’s target to give it a LIKE of 200+ 😊. We have used IR-Flash, Binalyze AIR, eDiscovery Technique, Elastic SIEM Search, WOLF etc. tools to compile this and to ascertain the root cause of this and we have also tried to show you how to create a Timeline of the Incident. If you can also pin this down and use for your own usecase and business, you will ROCK!! I have covered some of the techniques and tools in past, you can find the link below, and please stay tuned for other tools which we will also explore in sometime!

————————————————————————————————————————-
📝
Check out Incident Response Full Training Course👉 https://bit.ly/2OKQaFP

WATCH BELOW AS WELL, if you want to make your career in DFIR and Security Operations!!
————————————————————————————————————————-
INCIDENT RESPONSE TRAINING Full Course 👉https://youtube.com/playlist?list=PLjWEV7pmvSa4yvhzNsCjOJovOn1LLyBXB
DFIR Free Tools and Techniques 👉 https://youtube.com/playlist?list=PLjWEV7pmvSa6f-NTpXsaUYWZLjLAB_0TS
Windows and Memory Forensics 👉 https://youtube.com/playlist?list=PLjWEV7pmvSa50erciZUSnzvE7nK0FyvsH
Malware Analysis 👉 https://youtube.com/playlist?list=PLjWEV7pmvSa6u32RongesgDtkfKBfrFWW
IR Flash 👉 https://youtu.be/6kOinwAB-BY
Email Header Analysis 👉 https://youtu.be/qedIyy5KesQ

📞📲
FOLLOW ME EVERYWHERE-
————————————————————————————————————————-
✔ LinkedIn: https://www.linkedin.com/company/blackperl
✔ You can reach out to me personally in LinkedIn as well- https://bit.ly/38ze4L5
✔ Twitter: @blackperl_dfir
✔ Insta: (blackperl_dfir)https://www.instagram.com/blackperl_dfir/
✔ Can be reached via blackperl_dfir@yahoo.com

SUPPORT BLACKPERL
————————————————————————————————————————-
╔═╦╗╔╦╗╔═╦═╦╦╦╦╗╔═╗
║╚╣║║║╚╣╚╣╔╣╔╣║╚╣═╣
╠╗║╚╝║║╠╗║╚╣║║║║║═╣
╚═╩══╩═╩═╩═╩╝╚╩═╩═╝
➡️ SUBSCRIBE, Share, Like, Comment
☕ Buy me a Coffee 👉 https://www.buymeacoffee.com/BlackPerl
📧 Sponsorship Inquiries: archan.fiem.it@gmail.com

🙏
Curtsy
————————————————————————————————————————-
🎶
THBD:

https://www.facebook.com/thbds
https://www.youtube.com/channel/UCoXfgmSpdWC7JMKrMyg6a8Q

https://creativecommons.org/licenses/by/3.0/
Music provided by RFM: https://youtu.be/Ck0yeoa-XO4

🏁
Background Loop Animation By 5 Minute Edits
https://www.youtube.com/channel/UCS37yLAThwQHzVO5T0YD5fw
————————————————————————————————————————-
🙏 Thanks for watching!! Be CyberAware!! 🤞

Views : 5684
cyber security

Source by BlackPerl

Mourad ELGORMA

Fondateur de summarynetworks, passionné des nouvelles technologies et des métiers de Réseautique , Master en réseaux et système de télécommunications. ,j’ai affaire à Pascal, Delphi, Java, MATLAB, php …Connaissance du protocole TCP / IP, des applications Ethernet, des WLAN …Planification, installation et dépannage de problèmes de réseau informatique……Installez, configurez et dépannez les périphériques Cisco IOS. Surveillez les performances du réseau et isolez les défaillances du réseau. VLANs, protocoles de routage (RIPv2, EIGRP, OSPF.)…..Manipuler des systèmes embarqués (matériel et logiciel ex: Beaglebone Black)…Linux (Ubuntu, kali, serveur Mandriva Fedora, …). Microsoft (Windows, Windows Server 2003). ……Paquet tracer, GNS3, VMware Workstation, Virtual Box, Filezilla (client / serveur), EasyPhp, serveur Wamp,Le système de gestion WORDPRESS………Installation des caméras de surveillance ( technologie hikvision DVR………..). ,

Laisser un commentaire

Votre adresse e-mail ne sera pas publiée. Les champs obligatoires sont indiqués avec *