SANS Cyber Defense
SANS Cyber Defense
  • Видео 313
  • Просмотров 634 719
Get to Know Sean Thomas
Meet Sean Thoams, one of our newest instructors and cybersecurity experts. With years of experience in the industry, Sean is here to guide you through the fundamentals of cybersecurity. In this introductory video, learn about Sean's background, passion for teaching, and what to expect from SEC301 Introduction to Cyber Security. Subscribe for more insights and tips on mastering cybersecurity!
Learn more about Sean Thomas: www.sans.org/u/1x9B
Просмотров: 109

Видео

Who is SEC401 for?: Security Essentials for Everyone!
Просмотров 92Месяц назад
In this video, SANS course author Bryan Simon explains who can benefit from taking the SEC401 Security Essentials course. Whether you're new to cybersecurity or an experienced professional, this course is designed to enhance your understanding and skills in the cybersecurity field. Learn more about SEC401 Security Essentials - Network, Endpoint, and Cloud: www.sans.org/u/1wJN
Why Take SEC401?
Просмотров 105Месяц назад
In this video, SANS course author Bryan Simon explains the importance of taking SEC401 Security Essentials - Network, Endpoint, and Cloud and how it equips cybersecurity professionals with a well-rounded understanding of the industry. Discover why SEC401 is a must for anyone looking to excel in the cybersecurity field. Learn more about SEC401 Security Essentials - Network, Endpoint, and Cloud: ...
Next-Gen Labs: Finding Vulnerabilities Caused by Rushed Production
Просмотров 57Месяц назад
In this video, SANS course author Bryan Simon explores one of the key scenarios from SEC401, focusing on finding vulnerabilities caused by rushed production. This scenario gives students a comprehensive understanding of the challenges and considerations involved in managing application security under tight deadlines. Learn more about SEC401 Security Essentials - Network, Endpoint, and Cloud: ww...
Next-Gen Labs: Investigating Phishing Attacks
Просмотров 157Месяц назад
Join course author Bryan Simon as he explores the intricate details of investigating phishing attacks. This video takes you through one of the real-world scenarios found in the newest version of SEC401 Security Essentials: phishing. SEC401 demonstrates effective investigative techniques and the importance of endpoint security. Learn more about SEC401 Security Essentials - Network, Endpoint, and...
Next-Gen Labs: Preventing Data Loss and Insider Threats
Просмотров 105Месяц назад
In this video, SANS course author Bryan Simon explores one of the key scenarios from SEC401, focusing on the critical topic of preventing data loss and mitigating insider threats. Learn more about SEC401 Security Essentials - Network, Endpoint, and Cloud: www.sans.org/u/1wJN
Next-Gen Labs: Addressing AWS Compromise Issues
Просмотров 100Месяц назад
In this video, SANS course author Bryan Simon explores one of the key scenarios from SEC401, focusing on addressing AWS compromise issues. This scenario gives students a comprehensive understanding of the challenges and considerations involved in managing AWS security. Learn more about SEC401 Security Essentials - Network, Endpoint, and Cloud: www.sans.org/u/1wJN
What is the Goal of SEC401?
Просмотров 76Месяц назад
Are you curious about the goals and objectives of the SANS SEC401 Security Essentials course? In this video, SEC401 course author Bryan Simon provides a comprehensive overview of what you can expect from this intensive six-day class. Designed for aspiring and current cybersecurity professionals, SEC401 covers more than 30 topical areas, providing both high-level overviews and deep technical div...
What Is a Next-Gen Lab? | SANS SEC401
Просмотров 195Месяц назад
Discover the future of cybersecurity training with our latest video, "What Is a Next-Gen Lab?" In this informative video, SEC401 course author Bryan Simon dives deep into the innovative concept of next-generation labs. These labs are designed to provide real-world, scenario-based exercises that prepare security professionals for the challenges they will face in the field. Whether you're a seaso...
Meet Rich Greene: New SEC301 Instructor | Cybersecurity Expert Introduction
Просмотров 123Месяц назад
Meet Rich Greene, one of our newest instructors and cybersecurity experts. With years of experience in the industry, Rich is here to guide you through the fundamentals of cybersecurity. In this introductory video, learn about Rich's background, his passion for teaching, and what you can expect from SEC301 Introduction to Cyber Security. Subscribe for more insights and tips on mastering cybersec...
Detecting Command and Control Frameworks via Sysmon and Windows Event Logging
Просмотров 1,9 тыс.2 месяца назад
Prevention eventually fails. Bypassing tools such as Windows Defender Antivirus may be challenging, but it can be done. What then? What's left? Command and control (C2) frameworks such as Cobalt Strike, Sliver, and Metasploit typically leave telltale signs of their presence. This talk will largely be demo-based, showing how to analyze Windows event logs (including Sysmon logs) to hunt for trace...
Simplifying SSH Key Management: Leveraging ssh config for Security and Efficiency
Просмотров 6902 месяца назад
Burdened by the hassle of managing numerous SSH keys? Discover how ssh_config not only simplifies your key management but also enhances your SSH security posture. Join us to uncover strategies for efficient SSH key organization and learn critical tips for securing your SSH configurations. Perfect for anyone looking to streamline their SSH practices without compromising on security. Learn more a...
Cracking the Code: The Role of Programming in Information Security
Просмотров 3412 месяца назад
In this presentation, we'll explore an unpatched vulnerability within Windows, one that attackers can likely exploit to bypass your defenses. Through the lens of this attack, we'll address a significant question: "Are programming skills a requisite for excelling in the field of information security?" Recent research indicates that approximately 20% of entry-level positions in information securi...
Relentless Defense - Rules for Security Operations That Keep Attackers Off Your Network
Просмотров 8422 месяца назад
In the world of cybersecurity, attackers never sleep. But what if your security operations team could stay one step ahead? In this presentation, we'll dive into the essential strategies and processes for building a cyber defense posture that's a nightmare for attackers. From accurate detection to threat hunting, incident response to automation, learn how to build an agile and effective SOC that...
Unlocking Cybersecurity: From Zero to Hero in the Digital Age
Просмотров 5012 месяца назад
In an era where digital threats loom larger than ever, stepping into the world of cyber security can seem like venturing into a labyrinth of complexities. "Unlocking Cyber Security: From Zero to Hero in the Digital Age" is your guided expedition into this critical field, designed to transform cyber security novices into informed, empowered digital citizens and professionals. This talk strips aw...
AI Powered BladeRunners: The Role of AI in Implementing Zero Trust
Просмотров 3902 месяца назад
AI Powered BladeRunners: The Role of AI in Implementing Zero Trust
Breach Data Infrastructure
Просмотров 4972 месяца назад
Breach Data Infrastructure
A View From the Trenches
Просмотров 2262 месяца назад
A View From the Trenches
OSINT Psychology: Understanding the Human Element of Intelligence Gathering
Просмотров 3772 месяца назад
OSINT Psychology: Understanding the Human Element of Intelligence Gathering
Uncover the Invisible Gold Mines: How to Dump Raw Data From TikTok
Просмотров 6652 месяца назад
Uncover the Invisible Gold Mines: How to Dump Raw Data From TikTok
Trailblazer: Piercing the Veil of VehicleSecrets with OSINT Alchemy
Просмотров 5882 месяца назад
Trailblazer: Piercing the Veil of VehicleSecrets with OSINT Alchemy
A Practical Guide To OSINT On the Russian Internet
Просмотров 7332 месяца назад
A Practical Guide To OSINT On the Russian Internet
Stunt OSINT: AI and Content Networking Display
Просмотров 2252 месяца назад
Stunt OSINT: AI and Content Networking Display
From the Public Archive to the Wayback Machine: Thinking Like a Historian for OSINT Practitioners
Просмотров 2132 месяца назад
From the Public Archive to the Wayback Machine: Thinking Like a Historian for OSINT Practitioners
Every Contact Leaves a Trace
Просмотров 3272 месяца назад
Every Contact Leaves a Trace
Oh My Stars! Using Astronavigation Techniques to Do Image Geo-Positioning
Просмотров 1702 месяца назад
Oh My Stars! Using Astronavigation Techniques to Do Image Geo-Positioning
Telegram 101 to 401
Просмотров 1,2 тыс.2 месяца назад
Telegram 101 to 401
Maximizing Social Media Data Extraction Dumping and Preserving Content for OSINT
Просмотров 8072 месяца назад
Maximizing Social Media Data Extraction Dumping and Preserving Content for OSINT
toADS Hunting Online Advertisements
Просмотров 2412 месяца назад
toADS Hunting Online Advertisements
Identifying the Secret Military Helicopters of Washington, D C
Просмотров 3442 месяца назад
Identifying the Secret Military Helicopters of Washington, D C

Комментарии

  • @CyberHAC100k
    @CyberHAC100k 6 дней назад

    This would have been a great learning experience but the audio is killing it

  • @shinjoker
    @shinjoker 14 дней назад

    I've been following this series. Very good. Where is the Chapter 5 discussion? I can't find it on YT

  • @AmineOnline
    @AmineOnline 15 дней назад

    what elastic he talk about

  • @jampopoy18
    @jampopoy18 Месяц назад

    All I need is a company who will believe in me that I have what it takes to be part of their cybersecurity team.

  • @robertbluestein7800
    @robertbluestein7800 Месяц назад

    Kudos to the presenter!!’ Taking complex topics and communicating with a less technical audience is hard to do. This presentation may be the best one I’ve heard yet!

  • @Cyberevolution
    @Cyberevolution Месяц назад

    Great insights. Thanks.

  • @kamilstaraszewski7549
    @kamilstaraszewski7549 Месяц назад

    checked the briefing prompt. AI just invents civil unrests that never happened to make you happy. not worth it

  • @achyuthvishwamithra
    @achyuthvishwamithra Месяц назад

    Very nicely explained! Love it.

  • @greenerichard
    @greenerichard Месяц назад

    I couldn’t think of a place I’d rather be or a course I’d rather be teaching than SEC301!!!

  • @AkshayHariRajan68
    @AkshayHariRajan68 Месяц назад

    awesome buddy 🎉

  • @kasta851984
    @kasta851984 Месяц назад

    Great content! I have a question: What if I need to find the real IP address, which is behind Cloudflare, and this IP is associated with scanning activity? And the traffic associated with this is not web traffic. How can I reveal that real IP?

  • @Sinailionspride
    @Sinailionspride Месяц назад

    I will show this to a friend,see if they can help me.

  • @Sinailionspride
    @Sinailionspride Месяц назад

    God bless you.Thankyou anyhow.

  • @Sinailionspride
    @Sinailionspride Месяц назад

    And its BULLSHIT.The debtor does not show even with UCC1filing,whatever..because its in the name of anENTITY.However,your video IS somewhat helpful in an offhand way.ive been yanking my HAIR OUT for 5 MONTHS.Because of amormon property scammer! Its killing me!

  • @Sinailionspride
    @Sinailionspride Месяц назад

    Its all bs.the darn politicos are bought off for certain states,fraud based cult( not classified as a religion) where traveller clans exploit the elderly through leases,esp.farm leases,then steal the property owners info.identity to obtain usda fsa rda dnr,nrcs,whatever govt or private " ownership" lian,through a shell entity , where the propertty transfer is occurring without showing up on ANY county records,due to no lien,nothing shows up in county records UNTIL property acquusition iscompleted.ALREADY TRANSFERRED.

  • @deandavenport4505
    @deandavenport4505 Месяц назад

    "Promosm"

  • @neilbaal6758
    @neilbaal6758 2 месяца назад

    Superb as always John!

  • @victorioushitman3297
    @victorioushitman3297 2 месяца назад

    Proud of you buddy

  • @christianbordenave3922
    @christianbordenave3922 2 месяца назад

    Very good work, congratulations on the richness of your video and explanations. You must have spent a lot of time writing this article. This opens the door to many websites that use json bases.

  • @rulahmadrid
    @rulahmadrid 2 месяца назад

    In 15:18 how do you show the ip. I'm try in the website same the site gmgroup I'm not found anything. I'm switch to hosts and wrote the same commend in the search box I'm not find anything. How i can know the ip address by fingerprint. Thank you so much

  • @ashebaig8392
    @ashebaig8392 2 месяца назад

    I work in Security and wanted to ask if you can share the slides used in the ZTA - Beyond Proxy or Point Solutions

  • @x0rZ15t
    @x0rZ15t 2 месяца назад

    Thank you for sharing your knowledge with the community Nik. P.S. Love your books, have them both and use them all the time!

  • @kaileylynn-st7kb
    @kaileylynn-st7kb 2 месяца назад

    Do you have methodology to track pro Russian social media accounts that spread propaganda about the US election? I’m doing a final research project for school and I’m beyond lost 😫

  • @andrevm9410
    @andrevm9410 2 месяца назад

    Great video!

  • @queenbathshebaqueenofthedi8306
    @queenbathshebaqueenofthedi8306 2 месяца назад

    I want to know why that woman in your video thinks it's so funny????? I don't find it funny, amusing, or a damn game ...you don't have to live in a dark hole like I do... She is rude fuck her

  • @robbiejames1466
    @robbiejames1466 2 месяца назад

    Right!?!

  • @Bangarang341
    @Bangarang341 3 месяца назад

    Thank you for this lecture.

  • @SecHubb
    @SecHubb 3 месяца назад

    This a super important talk for network defenders!! QUIC is here and may be hiding things you don’t want happening on your network! Thanks to Andy for this. 🙌

  • @goldpony10
    @goldpony10 4 месяца назад

    Thank you. How can engage your service. We have a website using cloudflare selling our copyright material

  • @lxn7404
    @lxn7404 4 месяца назад

    Really nice approach to explain things with RFC and actual packet to follow through, thanks

  • @akinlolumakinwa3315
    @akinlolumakinwa3315 4 месяца назад

    Thank you for making the book a free resource and reference. This is an excellent book and Podcast indispensable for aspiring and current SOC Analysts as well as SOC Managers. Kudos to all the contributors and SANS Institute for facilitating this conversation in the Blueprint Podcast!

  • @MaitLember
    @MaitLember 4 месяца назад

    🎯 Key Takeaways for quick navigation: 01:26 🎙️ *Introduction to ChatGPT* - ChatGPT overview: artificial intelligence chatbot released in late 2022, trained on data from 2021. - Capabilities: trained using human inputs, continuously improving, impressive models, not internet-accessible by default. - Ease of use: simple interface, easy to generate content with specific prompts, potential for various applications. 03:00 🤖 *Potential Applications of ChatGPT* - Diverse applications: from generating creative content like poems to complex tasks like acting as a dungeon master in a role-playing game. - Specific prompts: ability to provide detailed responses tailored to specific requests, aiding in various domains like cybersecurity strategy development and HR tasks. - Constant evolution: evolving capabilities, ongoing improvements in understanding prompts and providing accurate responses. 07:27 📈 *Advancements in Prompt Engineering* - Prompt engineering importance: critical for eliciting desired responses, requires specific and well-crafted prompts. - Job trends: emergence of prompt engineering as a specialized job role in natural language processing. - Evolution of capabilities: expectation of software improving to understand less specific prompts over time. 11:11 📝 *Efficiency Enhancement with ChatGPT* - Efficiency enhancement: ChatGPT aids in completing tasks quicker, offering potential time-saving benefits. - Example scenarios: from drafting documents like HR termination letters to generating cybersecurity strategies, ChatGPT streamlines various processes. - Collaboration potential: ChatGPT's assistance complements human efforts, offering quick initial drafts for refinement. 15:16 ⚠️ *Challenges and Considerations with ChatGPT* - Ethical considerations: limitations on certain responses due to ethical, legal, and moral concerns. - Jailbreaking attempts: users' efforts to bypass controls to elicit specific responses from ChatGPT. - Potential misuse: need for responsible usage considering the software's capabilities and limitations. 17:43 🤖 *ChatGPT in Creative Scenarios* - Users creatively use ChatGPT in various scenarios, such as role-playing as characters from movies. 18:38 💡 *ChatGPT for Learning and Skill Development* - ChatGPT assists in creating personalized learning plans, such as learning Python for specific purposes like OSINT automation. - Recommends relevant resources and RUclips videos based on user preferences. - Provides customized plans and recommendations tailored to individual learning needs. 22:20 📊 *ChatGPT vs. Google: Different Use Cases* - ChatGPT is not intended to replace Google but serves as a valuable tool for answering certain types of questions that Google might not handle effectively. - Provides an example of using ChatGPT for complex queries that require nuanced understanding and ethical considerations. 24:10 🧠 *ChatGPT and the Intelligence Cycle: Planning Phase* - Discusses using ChatGPT for the planning phase of the intelligence cycle, including generating relevant search terms and creating personas. - Demonstrates ChatGPT's capability in generating fake names, usernames, and profile information for personas. - Explores the use of ChatGPT for generating realistic profile images using tools like "This Person Does Not Exist." 33:11 🔍 *ChatGPT for Data Collection and Automation* - Highlights the value of automation in data collection efforts, especially in the field of OSINT. - Demonstrates how ChatGPT can generate Python code for automated data collection tasks, enhancing efficiency and productivity. - Discusses the importance of coding skills in refining and customizing generated code for specific requirements. 35:41 🖥️ *Building Python Code with ChatGPT* - Using ChatGPT to generate Python code for web scraping tasks. - ChatGPT can provide well-commented and formatted code with room for improvement. - Iterative improvement process by testing, adjusting, and enhancing the generated code. 39:11 🔄 *Data Processing with ChatGPT* - Processing data collected for analysis is often overlooked but crucial. - ChatGPT can assist in data processing tasks, such as transcribing audio files. - Tools like Whisper, powered by OpenAI, offer free and easy audio transcription capabilities. 42:36 📊 *Automated Analysis with ChatGPT* - ChatGPT can automate analysis tasks, such as parsing JSON data for insights. - Examples include summarizing chat logs or extracting meaningful information from large datasets. - Automation frees up time for analysts and enhances efficiency in data analysis workflows. 47:27 😄 *Improving Sentiment Analysis with ChatGPT* - ChatGPT shows potential in improving sentiment analysis accuracy. - Despite challenges like sarcasm and slang, ChatGPT offers more nuanced sentiment analysis. - The tool's capability to understand context enhances sentiment analysis reliability. 50:33 📈 *Enhancing Reporting and Visualization* - ChatGPT assists in creating impactful reports by providing recommendations and reviewing for biases. - Visualizing data through charts and graphs in tools like Excel enhances report comprehension. - Tools like CyberChef and Excel empower analysts to process and analyze data effectively. 53:30 🛠️ *ChatGPT's Role in Automation* - ChatGPT can assist in writing code snippets for automation tasks. - The process may require some adjustments and tweaking but can significantly speed up tasks. - It's especially useful for tasks like commenting code, error handling, and making program improvements. 53:57 📰 *Gathering and Processing Data* - Gathering data is essential, but processing it into a suitable format for analysis is often underrated. - ChatGPT can aid in processing tasks, such as transcribing audio files, translating text, and formatting data. - Tools like Whisper, for audio transcription, and ChatGPT, for data formatting, enhance efficiency in data processing. 55:08 🖥️ *Developing Automation Scripts* - ChatGPT can generate Python code to automate tasks like web scraping and data extraction. - The generated code may require refinement and adjustment based on specific requirements. - Despite needing some tweaking, ChatGPT's generated scripts offer a valuable starting point for automation. 56:33 📹 *Transcribing and Summarizing Media Content* - Whisper, a tool similar to ChatGPT, can transcribe audio files efficiently. - ChatGPT can summarize lengthy transcriptions, providing concise insights into media content. - This capability streamlines the process of extracting key information from large volumes of media. 57:41 📊 *Enhancing Sentiment Analysis* - Sentiment analysis, historically challenging due to linguistic nuances, can be improved with ChatGPT. - ChatGPT's understanding of context and slang contributes to more accurate sentiment analysis. - While not perfect, ChatGPT's sentiment analysis capabilities offer promising advancements in natural language processing. 58:48 📑 *Creating Impactful Reports* - ChatGPT can assist in generating reports, recommending insights, and improving data visualization. - Automation of report generation saves time and enhances productivity. - Incorporating ChatGPT's summarization feature enhances the readability and efficiency of reports. Made with HARPA AI

  • @ss-rc1gy
    @ss-rc1gy 4 месяца назад

    What about akamai n other waf? 🙂

  • @MaitLember
    @MaitLember 4 месяца назад

    Revolutionizing Open Source Intelligence Operations with AI-Powered ChatGPT: A Comprehensive Exploration of Applications and Ethical Considerations 💬 Introduction to ChatGPT and its applications in the intelligence cycle. 00:00 ChatGPT is an AI chatbot released in late 2022, trained on human data. 00:00 It cannot access the internet directly but can be used with web browser plugins. 03:44 Easy to use, can generate poems, and images based on prompts. 04:50 🎮 Revolutionary AI prompts for interactive storytelling and problem-solving scenarios with ChatGPT. 04:55 ChatGPT generates dynamic Dungeons and Dragons campaigns, adapting to user input. 04:55 The AI can create personalized scenarios, such as setting the game in the Star Wars universe. 06:25 Prompt engineering is a burgeoning field, focusing on precise requests for AI output. 07:30 ChatGPT can assist in developing cybersecurity strategies and policies for companies. 09:01 💡 Revolutionizing information retrieval and creation with AI-powered ChatGPT 09:46 AI tool ChatGPT enhances password policy and access control discussions 09:46 Advances in end-to-end security procedures like antivirus implementation 09:52 Utilizing ChatGPT for drafting termination letters and HR communications efficiently 12:00 Potential for ChatGPT to streamline benefits and policy inquiries, improving response accuracy 14:15 💡 Revolutionizing information retrieval through ChatGPT for diverse applications and ethical considerations. 14:52 Potential for setting up a mechanism for specific advice retrieval is close. 14:52 Challenges with prompts leading to controversial or ethically sensitive responses. 15:19 Discussion on 'Dan' scenarios where ChatGPT is pushed beyond ethical boundaries. 15:51 Examples of 'jailbreaks' or 'escapes' to make ChatGPT answer restricted queries. 16:12 Utilizing ChatGPT for learning resources like Python and Linux skills development. 18:40 💡 Revolutionizing intelligence gathering with AI-powered ChatGPT for enhanced planning and analysis. 19:55 Customized learning plans tailored to individual needs for efficient skill acquisition. 19:55 Utilizing ChatGPT for personalized recommendations and resources, including RUclips videos. 20:26 ChatGPT's unique ability to assist in complex intelligence analysis tasks, surpassing traditional search engines. 23:04 ChatGPT's role in enhancing the intelligence cycle, from planning to dissemination and integration. 24:01 💻 Revolutionizing online investigations using AI-generated personas and images with GAN technology. 24:55 Utilizing AI to create fake personas for online investigations 24:55 Discussing the concept of sock puppets and their use in spreading false information 25:00 Generating fake names for a French woman in her 30s using ChatGPT 25:14 Creating usernames and profiles with bio information for the personas 26:04 Using 'this person does not exist' website to generate fake profile images 27:22 Explaining the technology behind GAN for creating realistic fake faces 28:00 Using huggingface platform for machine learning and AI code sharing and collaboration 29:36 💬 Enhancing data collection and persona creation using AI-generated faces and code automation. 30:08 The ability to automate tasks using ChatGPT is a valuable skill for optimizing resource allocation. 30:08 AI-generated faces can be used to create realistic personas for various purposes. 30:08 ChatGPT enables exploration of emerging AI tools like face swap for data manipulation. 30:14 Face swap technology can generate fake faces that closely resemble real individuals. 30:26 Efficient automation through ChatGPT can optimize data gathering processes. 33:07 AI tools like ChatGPT offer a blend of manual and automated data collection methods. 33:14 Automated processes like writing code using ChatGPT can streamline data collection efforts. 34:05 ChatGPT can assist in writing Python code for tasks like web scraping and data analysis. 34:36 Python coding skills remain valuable for tweaking AI-generated code outputs. 34:58 💻 Enhancing data processing with ChatGPT for efficient coding and program improvement. 35:17 Efficient coding through ChatGPT's assistance in fixing and adjusting code quickly. 35:17 Building code like Legoblocks for easy testing and modification. 35:27 ChatGPT's ability to comment code effectively for better understanding. 36:06 Iterative program improvement suggestions by ChatGPT based on user input. 36:34 Limitations of ChatGPT in handling large datasets and occasional freezing issues. 38:03 Importance of data processing in preparing collected data for analysis. 39:03 🤖 Revolutionizing data analysis and transcription with AI technology. 40:13 OpenAI's Whisper project enables free audio and video transcription with language support. 40:13 Conti ransomware gang's leaked chat logs in Russian are analyzed effortlessly using ChatGPT. 43:16 ChatGPT parses Json data to summarize conversations accurately without specific instructions. 44:01 Automation through AI simplifies complex data analysis tasks with minimal guidance. 45:16 🤖 Revolutionizing sentiment analysis with machine learning and ChatGPT. 45:29 Automation in art generation poses challenges in copyright and legality. 45:29 Automating report generation in mapping saved time and improved efficiency. 46:01 Sentiment analysis historically faced challenges due to evolving language nuances. 47:23 Collaboration with experts like Dave Holz showed optimism for solving sentiment analysis. 48:38 ChatGPT's sentiment analysis showed improved accuracy by considering context. 49:09 💡 Enhancing data analysis with visualizations and Python automation for OSINT reports. 51:23 Using pivot tables and charts for data analysis in Excel 51:23 Importance of visually appealing reports for impact 51:53 Converting JSON to CSV for Excel analysis using CyberChef tool 52:18 Guidance on automating data analysis with Python 53:23 Verifying credibility of news sources for OSINT investigations 54:09 ⚙ Enhancing productivity through automation with ChatGPT for text summarization and translation. 55:13 Developing Python code to scrape and download videos from websites. 55:13 Utilizing Whisper for real-time translation of Russian audio to English. 56:26 Utilizing ChatGPT for summarizing lengthy transcribed text efficiently. 57:46 Potential applications in automating email summaries and news aggregation. 58:04 Automation as a key survival strategy for one-person operations. 58:27 Offering resources and follow-up answers on digital forensics tips. 59:00 Encouraging audience interaction via Twitter and email for further discussions. 59:34 🎉 Exciting wrap-up of a successful webcast with high audience engagement. 59:57 Acknowledgement to Matt for valuable content and timing. 59:57 Appreciation to the community and audience for participation. 1:00:04 Encouragement to visit cns.org webcast for upcoming events. 1:00:18 Recommendation to follow Matt's Blog for weekly informative content. 1:00:26 Anticipation of addressing numerous audience questions. 1:00:35 Humorous remark on being busy and weekend plans. 1:00:49 Closure of the webcast with gratitude and hope for future participation. 1:01:04

  • @northern5428
    @northern5428 5 месяцев назад

    As a new SOC Engineer , This series has given me a lot of information and ways to improve my skills and knowledge. I look forward to reading the book. Thanks to all 3 authors and the host.

  • @esmatullahsaidy4037
    @esmatullahsaidy4037 5 месяцев назад

    Thanks john and the three authors of the book!

  • @queenbathshebaqueenofthedi8306
    @queenbathshebaqueenofthedi8306 5 месяцев назад

    Meshing... Not knitting... Could you get it right proper not on purpose???? 4 1nc??😢😢😢😢

  • @queenbathshebaqueenofthedi8306
    @queenbathshebaqueenofthedi8306 5 месяцев назад

    Not tracking ships you just called the ships fucking people!!! That's what y'all like to track... Not shipsb that I'm gonna talk after I cell it then sale it!!!! April fun for me to have to turn it around and flip tables on you trackers and track you f****** back staring right at you through that mirror python snake fat b****

  • @queenbathshebaqueenofthedi8306
    @queenbathshebaqueenofthedi8306 5 месяцев назад

    I ran across a programming language called "brain fuck"... How classy and fancy for a programming language!!! I didn't like one... No sir... Not at all ...😮😮😮I loved it❤❤❤

  • @queenbathshebaqueenofthedi8306
    @queenbathshebaqueenofthedi8306 5 месяцев назад

    You narrowed that spearhead down market targeting... To my family bloodline...I love y'all... In Texas... In my yert!!!🎉🎉🎉 9:00 9:02 9:03

  • @queenbathshebaqueenofthedi8306
    @queenbathshebaqueenofthedi8306 5 месяцев назад

    Damn Justin!!! 😂 just in time&Case man!!! You men are so very purrrrttty!!!❤❤❤❤❤

  • @johnvardy9559
    @johnvardy9559 5 месяцев назад

    Nik really, i never see something like that you are amazing.I just start my trip to soc analyst and i think those tools will be helpfull for me.

  • @DoingFedTime
    @DoingFedTime 5 месяцев назад

    Thank you for having me!

  • @Mariam_ww
    @Mariam_ww 6 месяцев назад

    Great course. Is there still no update about the github page?

  • @Unangepasse-hn7qs
    @Unangepasse-hn7qs 6 месяцев назад

    25:13 : the problem is that you have no way of knowing if what ChatGPT tells you is correct. In that example, almost half of the names are NOT suitable for French women in their 30s. If you create a sock puppet of a French woman called Brigitte who is supposed to be 34, it would be really weird and might reveal that something's wrong with the profile. So be really careful when relying on ChatGPT. Always double check whatever data or info it's generating.

  • @RahimLadhajuma
    @RahimLadhajuma 7 месяцев назад

    Nice! Thanks for this! 🧠

  • @cardan3873
    @cardan3873 7 месяцев назад

    Great content, I have a lot to learn about using chatgpt effectively and efficiently. Thanks for the direction!

  • @WatsonInfosec
    @WatsonInfosec 7 месяцев назад

    Question, will this slide deck be available for download? I would like this for a reference guide.

  • @EdmundWist
    @EdmundWist 7 месяцев назад

    Pen testing needs to translate to quantifying risk, developing remediation plans that speak to the business need, not just cybersecurity, and create real budget and measurable risk reduction. Rotating in different people too poke at your cybersecurity, validate your ego and check an annual activity box should not be the goal.

  • @EdmundWist
    @EdmundWist 7 месяцев назад

    Hunting/Modeling takes a vast amount of experience and knowledge, however, its a great place to learn and bring fresh perspectives. Maybe its best to bring an old priest and a young priest!