Data Sources and Detections

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
1 hour
Difficulty
Beginner
CEU/CPE
2
Video Transcription
00:00
welcome to my older one less than six data sources and detections.
00:05
In this lesson, we will define and explore what are attacked. Data sources and detections.
00:10
Appreciate the relationship between these data sources and detections,
00:13
and finally identify how these data sources and detections are applied to techniques and some techniques.
00:21
As you recall from lesson for attack techniques. And some techniques have a wealth of metadata.
00:26
And in this lesson we will explore how data sources and detection can be used by defenders to identify adversary behaviors.
00:35
Attack defines data sources as sources of information collected by sensors or logging systems that we can use to identify adversary behaviors.
00:43
You can think of this as where to collect data
00:46
as inputs to the detection process.
00:50
Detection is built on this idea of information, collected data sources and provide the high level analytic processes or detection strategies that we can use to identify these adversary behaviors.
01:00
You can think of this as how to interpret the data collected from data sources
01:07
for any given technique or some technique, you'll see a listing of data sources as well as a section towards the bottom. Describing a detection strategy.
01:15
You also notice that there's a parallel between the sources of data as well as what? How to interpret that data.
01:26
And with that, we turn knowledge. Check for less than six
01:30
attack data sources. Tell us,
01:32
please take a moment
01:34
and select the correct answer before proceeding.
01:41
In this case, the correct answer is C attack data sources tell us what data we should collect via sensors or logs for a given adversary technique or some technique
01:52
in summary attack data sources tell us what data to collect. All detections. Tell us how to analyze that collected data
02:00
and finally attacked data sources. Detections. AARP replied specific to each technique or sub technique.
Up Next