Focus2Learn
search
Ctrlk
  • Way2Learn
  • OSI Model
    • Intro
    • OSI Model Layers - Functions and Protocols
    • TCP/IP Protocol Suite
    • Layers Functionalities
    • TCP and UDP ports
    • Network Connecting Devices
    • Network Security Devices
    • Network Vulnerability
    • Kerbros
  • Architectures
    • Qradar
    • Splunk ES
    • SOC Analyst Work Culture
    • Playbooksarrow-up-right-from-square
  • Information Security
    • AAA
    • CIA Traid
    • Cyber Attacks
    • Cyber Kill Chain
    • Threat - Vulnerability - Exploit - Risk
    • MITRE ATT&CK Framework
    • Spoofing Attacks
  • Log Analysis
    • SSL
    • Splunk Queries
    • Log Aggregation, Processing and Analysis for Security
    • Firewall Logging
    • User-Agent Analysis
    • Proxy Server
    • DNS Server
    • Email Analysis
    • Network Data Analysis
    • Web Application Security
    • Threat Hunting with Microsoft O365 Logs
    • Darktrace
    • EDR
    • Random Topics
    • Incident Response
    • Windows Logs
    • Windows Ransomware Detection
    • Ref Diagrams
  • External Sites
    • Fav Links
    • Cyber-Kill-Chain_YouTube_Linkarrow-up-right-from-square
    • OWASP TOP 10 - 2017arrow-up-right-from-square
    • Splunk UseCasesarrow-up-right-from-square
    • CCNA Coursearrow-up-right-from-square
    • Switcharrow-up-right-from-square
    • Port Numbersarrow-up-right-from-square
    • Windows Event IDsarrow-up-right-from-square
    • Splunk-Oxygenarrow-up-right-from-square
    • Privilege Escalation Attackarrow-up-right-from-square
    • Threat Hunting with Splunkarrow-up-right-from-square
  • PDF Files
    • Imp PDF Files
  • Online Reputation Checking Tool
  • AWS Cloud Security
    • AWS GuardDuty
  • Security Controlsarrow-up-right-from-square
  • CrowdStrike
    • Falcon Queries
    • User Sessions Hunting
    • Day to Day
    • Hunting Falcon
  • DarkTrace
    • Ref Links
  • Web Application Security
    • Links
  • Threat Hunting - Suspicious User Agents | by mthcht | Detect FYI
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Log Analysis

Windows Ransomware Detection

hashtag
Video:1

https://www.youtube.com/watch?v=O4qc25-kV8Q&ab_channel=Splunkwww.youtube.comchevron-right

hashtag
Video:2

https://www.youtube.com/watch?v=2si3VTvEi20&t=141s&ab_channel=Splunkwww.youtube.comchevron-right

hashtag
Video:3

https://www.youtube.com/watch?v=5jZB-onFH6M&t=27s&ab_channel=Splunkwww.youtube.comchevron-right

hashtag
Video:4

https://www.youtube.com/watch?v=Syi4IFrtEuw&t=65s&ab_channel=Splunkwww.youtube.comchevron-right

hashtag
Video:5

https://www.youtube.com/watch?v=8HRZpxrJELU&t=72s&ab_channel=Splunkwww.youtube.comchevron-right

hashtag
Video:6

https://www.youtube.com/watch?v=WBdxtQqAVeQ&ab_channel=Splunkwww.youtube.comchevron-right

PreviousWindows Logschevron-leftNextRef Diagramschevron-right

Last updated 4 years ago

  • Video:1
  • Video:2
  • Video:3
  • Video:4
  • Video:5
  • Video:6