SOC100 Class 20 - Vulnerability Management, Cryptography, Symmetric & Asymmetric Encryption Part 1

We're taking you from navigating the Windows start menu to triaging Tier 1 SOC Analyst tickets by live stream instructing every piece of content from the pay...

Level Effect•534 views•04:13:07

🔥 Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Bangladesh under the topic 's'.

About this video

We're taking you from navigating the Windows start menu to triaging Tier 1 SOC Analyst tickets by live stream instructing every piece of content from the pay what you can (PWYC) 400+ hour SOC100 course series over 5 months. Recordings free, and course is minimum $19, suggested $29 with virtual machines provided and lab time. Full playlist: https://youtube.com/playlist?list=PLarzZ7tJk-lF1l2PpqwPJcVAlYkLl6nLh&si=TvuJWlDVeU0r_s99 Full course info 👉 https://www.leveleffect.com/soc100 Stream calendar 🗓️ https://docs.google.com/spreadsheets/d/12WRVm_52PmFkp6Lr8v9v8M1ONcRytOz8zizYBy10LHI/edit?gid=0#gid=0 Stream Details: - Class 20 - Course: SOC100-2 - Domain: Governance, Risk, Compliance (GRC) & Cryptography Website: https://leveleffect.com Discord: https://discord.gg/level-effect Twitch: https://www.twitch.tv/leveleffect Newsletter & Blog: https://news.leveleffect.com/ LinkedIn: https://www.linkedin.com/school/leveleffect 00:00:00 - Welcome back and introductions. 00:01:52 - Group discussion: Sharing holiday highlights and new learnings. 00:06:12 - Teaser for an upcoming event with community involvement. 00:09:29 - Importance of networking in the cybersecurity community. 00:10:49 - Introduction to the agenda: Cryptography and GRC continuation. 00:11:55 - Roadmap: Triage skills for a compromised Windows host starting next week. 00:12:33 - Encouragement for home lab setups and practical learning. 00:14:37 - Overview of the three core GRC policies: Asset management, configuration management, and patch management. 00:17:02 - Explanation of vulnerability management as a logical, procedural approach. 00:18:44 - Identifying vulnerabilities: Scanning tools and frameworks. 00:21:51 - Overview of manual vs. automated vulnerability scanning. 00:26:01 - Definitions of CVE (Common Vulnerabilities and Exposures) and CVSS (Common Vulnerability Scoring System). 00:33:22 - Demonstration of a CVE record and its relationship to CVSS scores. 00:37:06 - Evaluating vulnerabilities when public data isn’t available: Baseline deviation approach. 00:38:46 - Discussion: How to address deviations and determine cyber threats. 00:43:24 - Evaluating suspicious activity: Using geolocation and login patterns. 00:46:27 - Key decision-making criteria in cybersecurity threat analysis. 00:49:21 - Recap: The importance of GRC in vulnerability management and its integration with SOC operations. 00:50:49 - Introduction to vulnerability scanning as a GRC component. 00:55:29 - Breakdown: Network vs. agent-based scanning and their uses. 01:00:10 - Role of tools like Nessus and Nmap in identifying vulnerabilities. 01:05:03 - Reflection on the importance of a comprehensive GRC program to SOC efficiency. 01:08:57 - Transition to first lab: Cyber risk and maturity assessment. 01:11:25 - Introduction to the NIST Cybersecurity Framework Maturity Tool. 01:23:29 - Explanation of the tool’s maturity levels (1-5) and their significance. 01:30:48 - Practical example: Understanding levels 1-3 through real-world scenarios. 01:36:16 - Career insights: Startups vs. established companies in terms of security maturity. 01:38:51 - Balancing experience and stability in career choices. 01:46:34 - Asset management scoring example: Application of the maturity model. 01:52:07 - Overview of SOC analyst role within GRC frameworks. 02:00:23 - Second lab: Hands-on Windows server hardening practices. 02:08:57 - Introduction to cryptography: Basics and historical context. 02:15:23 - Symmetric vs. asymmetric encryption: Key differences, strengths, and weaknesses. 02:23:34 - Applications of encryption: Real-world examples and industry use cases. 02:30:45 - Understanding hashing: Definitions, purposes, and use in data integrity. 02:35:56 - Public Key Infrastructure (PKI): Overview and the role of certificate authorities. 02:40:12 - Best practices for implementing cryptographic techniques in cybersecurity. 02:48:19 - Mid-session recap: Key concepts covered in cryptography basics. 02:55:30 - Common challenges in cryptography implementation and potential solutions. 03:05:44 - Blockchain technology: Its reliance on cryptography and potential applications. 03:15:29 - Q&A session: Deep dive into theoretical concepts and community questions. 03:25:47 - Exploring the future of encryption and emerging cryptographic methods. 03:35:11 - Conclusion of cryptography section part 1 03:45:00 - Final thoughts: Transitioning to triage and practical labs next week. 03:50:00 - Community Q&A: Closing remarks and participant engagement.

Video Information

Views
534

Total views since publication

Likes
20

User likes and reactions

Duration
04:13:07

Video length

Published
Jan 8, 2025

Release date

Quality
hd

Video definition

Tags and Topics

This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:

Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.