Ibrahim Akdağ| Ph.D.Applied Explanation of the “Cyber Kill Chain” Model as a Cyber Attack MethodologyThe rapidly changing threat environment, complexity and increasing frequency of cyber attacks in cyberspace have caused cyber security…Mar 5, 2022
Ayushi JainCostly Sides of Software: Million-Dollar Lessons from Recent MalfunctionsIn today’s technological or interconnected world, software is critical in various industries, from finance to healthcare. From glitches to…Feb 28Feb 28
Lisandro RayaSIEM Tutorial — Using Azure Sentinel to Map Cyber AttacksSIEM technology empowers cybersecurity analysts by collecting and analyzing data from various sources to detect and respond to security…Sep 25, 2023Sep 25, 2023
Andrew FisherAzure Sentinel Map with Live Cyber attacks (Honeypot)Huge thanks to Josh Madakor for the inspiration and guidance on undertaking this lab.Sep 11, 2023Sep 11, 2023
Ibrahim Akdağ| Ph.D.Applied Explanation of the “Cyber Kill Chain” Model as a Cyber Attack MethodologyThe rapidly changing threat environment, complexity and increasing frequency of cyber attacks in cyberspace have caused cyber security…Mar 5, 2022
Ayushi JainCostly Sides of Software: Million-Dollar Lessons from Recent MalfunctionsIn today’s technological or interconnected world, software is critical in various industries, from finance to healthcare. From glitches to…Feb 28
Lisandro RayaSIEM Tutorial — Using Azure Sentinel to Map Cyber AttacksSIEM technology empowers cybersecurity analysts by collecting and analyzing data from various sources to detect and respond to security…Sep 25, 2023
Andrew FisherAzure Sentinel Map with Live Cyber attacks (Honeypot)Huge thanks to Josh Madakor for the inspiration and guidance on undertaking this lab.Sep 11, 2023
Mani Bharathi BVisualizing live Cyber-attacks using Microsoft SentinelThis project focuses on the setup and utilization of Microsoft Sentinel, a cloud-native Security Information and Event Management (SIEM)…Jul 6, 2023
Ajay NoojiEthical Hacking Part-2 : Cyber AttackOn the first part of the series I had discussed basics of ethical hacking, namely information security. On this part, we will directly…Aug 27, 2022