July 2018
Intermediate to advanced
356 pages
9h 18m
English
After discussing some of the common techniques for detecting unknown potential threats, we are going to introduce some open source frameworks to do security analysis with threat intelligence and big data technologies. You may consider applying these open source solutions as a basis if you are planning to build a security log analysis framework that can do the following:
|
Project |
Key features |
|
TheHive project |
TheHive provides threat incident response case management that allows security ... |