How to Turn On Advanced Data Protection for iPhone – Keep Your iCloud Data Secure!
John Hubbard
How to Turn On Advanced Data Protection for iPhone – Keep Your iCloud Data Secure!
1:08
Cyber Threat Intelligence Explained and How Install MISP Threat Intelligence Platform with Docker
John Hubbard
Cyber Threat Intelligence Explained and How Install MISP Threat Intelligence Platform with Docker
13:44
The Best SOC Analyst Certification for 2022 - GIAC GSOC!
John Hubbard
The Best SOC Analyst Certification for 2022 - GIAC GSOC!
2:46
How the Encrypted Client Hello TLS Extension (ECH) Works (and How it Impacts Security Operations)
John Hubbard
How the Encrypted Client Hello TLS Extension (ECH) Works (and How it Impacts Security Operations)
10:59
Ask Us Anything! Cyber Defense Live Q&A #2 -  05/07/2021
John Hubbard
Ask Us Anything! Cyber Defense Live Q&A #2 - 05/07/2021
1:44:19
Ask Us Anything! Cyber Defense Live Q&A #1 - 04/30/2021
John Hubbard
Ask Us Anything! Cyber Defense Live Q&A #1 - 04/30/2021
1:30:02
12 Days of Defense - Day 12: Should I Get A SOC/Cyber Defense Job?
John Hubbard
12 Days of Defense - Day 12: Should I Get A SOC/Cyber Defense Job?
11:56
12 Days of Defense - Day 11: Prioritizing Detection with MITRE ATT&CK Navigator
John Hubbard
12 Days of Defense - Day 11: Prioritizing Detection with MITRE ATT&CK Navigator
16:32
12 Days of Defense - Day 10: How to Analyze HTTP/2 Traffic in Wireshark
John Hubbard
12 Days of Defense - Day 10: How to Analyze HTTP/2 Traffic in Wireshark
16:41
12 Days of Defense - Day 9: How to Analyze HTTP Traffic in Wireshark
John Hubbard
12 Days of Defense - Day 9: How to Analyze HTTP Traffic in Wireshark
18:54
12 Days of Defense - Day 8: How Encrypted SNI works (and How It Will Blind Your Security Team)
John Hubbard
12 Days of Defense - Day 8: How Encrypted SNI works (and How It Will Blind Your Security Team)
10:07
12 Days of Defense - Day 7: Detecting Malware Without TLS Decryption / TLSv1.2 vs TLS1.3
John Hubbard
12 Days of Defense - Day 7: Detecting Malware Without TLS Decryption / TLSv1.2 vs TLS1.3
9:39
12 Days of Defense - Day 6: How DNS over HTTPS (DoH) Works / DNS Privacy
John Hubbard
12 Days of Defense - Day 6: How DNS over HTTPS (DoH) Works / DNS Privacy
12:23
12 Days of Defense - Day 5: How Windows Security Logging Works
John Hubbard
12 Days of Defense - Day 5: How Windows Security Logging Works
14:57
12 Days of Defense - Day 4: How to Analyze Email Headers and How Spoofed Email Works
John Hubbard
12 Days of Defense - Day 4: How to Analyze Email Headers and How Spoofed Email Works
21:31
12 Days of Defense - Day 3: How the SOC Works (Security Monitoring Tools and Architecture)
John Hubbard
12 Days of Defense - Day 3: How the SOC Works (Security Monitoring Tools and Architecture)
18:33
12 Days of Defense - Day 2: How to use Zeek for PCAP Analysis
John Hubbard
12 Days of Defense - Day 2: How to use Zeek for PCAP Analysis
13:03
12 Days of Defense - Day 1: PDF and Office Doc Malware IOC Extraction
John Hubbard
12 Days of Defense - Day 1: PDF and Office Doc Malware IOC Extraction
16:34
Virtuous Cycles: Rethinking the SOC for Long-term Success - John Hubbard
John Hubbard
Virtuous Cycles: Rethinking the SOC for Long-term Success - John Hubbard
47:30
How To Use The Elastic Stack as a SIEM - John Hubbard
John Hubbard
How To Use The Elastic Stack as a SIEM - John Hubbard
1:14:17