IT & Software Attack Tactics – Black Hills Information Security (1 Viewer)

Currently reading:
 IT & Software Attack Tactics – Black Hills Information Security (1 Viewer)

Covers web development, programming, AI, cloud computing, DevOps, and cybersecurity.
Recently searched:

protectaccount

Member
Amateur
LV
4
Joined
Nov 21, 2025
Threads
1,137
Likes
104
Awards
9
Credits
23,221©
Cash
0$
snyt5yx.jpg

In this webcast, we will be walking through some configuration changes required in order to detect attacks. We will also show you exactly what those logs will produce when configured properly.

Finally, we show you tools like LogonTracer, DeepBlueCLI, and some cool basic PowerShell to pull out important information from these logs.
Link:
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Tips
Recently searched:

Similar threads

Users who are viewing this thread

Top Bottom