Using Stacking to Find Evil - Data Analysis Techniques for Threat Detection
Cyber Mentor via YouTube
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn how to leverage stacking (also known as data stacking, frequency of occurrence analysis, or long tail analysis) as a powerful intrusion analysis technique for uncovering malicious artifacts in cybersecurity environments. Discover the fundamentals of stacking methodology and understand how frequency analysis can reveal anomalous patterns that indicate potential security threats. Master command line stacking techniques for initial data analysis and investigation workflows. Explore advanced stacking implementations using Splunk for comprehensive log analysis and threat detection across enterprise environments. Gain practical insights into scaling stacking techniques across large organizational infrastructures to identify suspicious activities and potential indicators of compromise. Develop skills in defensive security analysis that can enhance your threat hunting capabilities and improve your ability to detect malicious behavior through statistical analysis of system and network data.
Syllabus
0:00 - Introduction
1:17 - What is Stacking?
4:21 - Command Line Stacking
11:48 - TCM Academy
13:10 - Stacking in Splunk
20:18 - Stacking Across the Enterprise
25:43 - Conclusion
Taught by
The Cyber Mentor