У нас вы можете посмотреть бесплатно 4-Hour SOC Analyst Workshop | Splunk, SIEM, SOAR, Event Logs, PowerShell, and More (Hands-On) или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
#hackervlog #cybersecurity #socanalyst 🚨 Live SOC Analyst Workshop - 4 Hours of Complete Hands-On Training! Are you ready to dive deep into the world of Security Operations? This 4-hour workshop is designed for aspiring and working SOC analysts who want practical exposure to real-world tools and techniques used in monitoring, detection, and incident response. Part 2: https://www.youtube.com/live/mlqlkTpe... 🔥 In This Workshop, You Will Learn: ✅ Windows Event Viewer – How to detect and monitor suspicious activity ✅ Generating Logs from Kali Linux – Simulate attacks for analysis ✅ Observing and Exporting Logs from Windows ✅ PowerShell Basics – Write, run, and automate with .ps1 scripts ✅ Real-world PowerShell examples for cybersecurity use cases ✅ Introduction to SOC – Roles, responsibilities, and goals ✅ What is SIEM & SOAR – Understand their importance in modern security ✅ Splunk Introduction – Interface, architecture, and use cases ✅ Core Components of Splunk ✅ How Splunk Works – From data ingestion to alerting and dashboards 👨💻 Whether you’re a beginner or brushing up your blue team skills, this session gives you job-ready knowledge with live demonstrations. Great for preparing for SOC Analyst, Blue Team, or Cybersecurity Analyst roles. 🔐 No fluff. Just practical, real-world cybersecurity training. 📌 Timestamps 00:00:00 Table of Content 00:10:20 Event Viewer in Windows 00:26:14 Generate Logs via Kali Linux 00:42:55 Observe Logs in Windows Event Viewer 00:57:20 Export Logs 01:05:55 10 Min Break 01:16:35 Introduction to PowerShell 01:26:10 Create and Run a .ps1 Script 01:47:10 Practical PowerShell Examples 01:58:00 Introduction to SOC 02:02:06 10 Min Break 02:14:23 Introduction to SOC 02:31:08 What is SIEM 02:32:34 What is SOAR? 02:36:45 What is Splunk? 02:42:00 Core Components of Splunk 02:56:24 How Splunk Works _________________________________________________________________________________ 👉Useful Link: https://linktr.ee/hackervlog 👉What's App: https://whatsapp.com/channel/0029VaGM... _________________________________________________________________________________ 🤩*Our Course and Details* 👉 Get Course Details: https://asdacademy.in/youtube-form 👉 Live Bug Hunting (Hacker Vlog Live): / @hackervloglive 👉Download "ASD Academy" App📲: https://play.google.com/store/apps/de... 👉 Download "Hacker Vlog" Mobile App 📲: https://play.google.com/store/apps/de... 👇For Collaboration/Unboxing Video/Sponsorship/Free Seminar/Free Workshop email us at hackervlogofficial@gmail.com 👇Join this channel to get access to perks: / @hackervlog _________________________________________________________________________________ *Stay Connected with us* 👇Do you have any Questions? Ask your Enquiry and Interact Live 1:1 with our Experts (Mr. Tapan Kumar Jha & Miss. Riddhi Soral) https://asdacademy.in/youtube-form 👇 For Cyber Security & Coding Diploma/Courses Enquiry Visit: https://www.asdacademy.in/youtube-form 👇Follow us on Twitter: / vlog_hacker 👇Follow us on *Instagram*: / hackervlogofficial 👇Follow us on *Facebook*: / hackervlogofficial Intro Music credits- Disclaimer:- This video is made available for educational and informational purposes only. We believe that everyone must be aware of ethical hacking and cyber security to avoid different types of cyberattacks on computers, websites, apps, etc. Please regards the word hacking as ethical hacking everytime we use it. All our videos have been made using our own systems, servers, routers, and websites. It does not contain any illegal activities. Our sole purpose is to raise awareness related to cybersecurity and help our viewers learn ways to defend themselves from any hacking activities. Hacker Vlog is not responsible for any misuse of the provided information.