<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Soc-and-Detection-Engineering on Jesus Oseguera</title><link>https://r0tbyt3.dev/tags/soc-and-detection-engineering/</link><description>Recent content in Soc-and-Detection-Engineering on Jesus Oseguera</description><generator>Hugo</generator><language>en-us</language><atom:link href="https://r0tbyt3.dev/tags/soc-and-detection-engineering/index.xml" rel="self" type="application/rss+xml"/><item><title>Detection Engineering</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/detection-engineering/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/detection-engineering/</guid><description>Detection Engineering Detection Engineering - the systematic development and tuning of detection rules, analytics, and coverage mappings against adversary techniques.
Detection Engineering Fundamentals MITRE ATT&amp;amp;CK Mapping Related Links: Endpoint Security SIEM and Tools SOC Honeypots Threat Hunting Techniques</description></item><item><title>Detection Engineering Fundamentals</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/detection-engineering/detection-engineering-fundamentals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/detection-engineering/detection-engineering-fundamentals/</guid><description>Detection Engineering Fundamentals Detection Engineering Fundamentals - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: MITRE ATT&amp;amp;CK Mapping</description></item><item><title>Endpoint Security</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/endpoint-security/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/endpoint-security/</guid><description>Endpoint Security Endpoint Security - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Detection Engineering SIEM and Tools SOC Honeypots Threat Hunting Techniques</description></item><item><title>Hayabusa</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/siem-and-tools/hayabusa/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/siem-and-tools/hayabusa/</guid><description>Hayabusa Hayabusa - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Maltego SIEM Fundamentals Splunk</description></item><item><title>Maltego</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/siem-and-tools/maltego/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/siem-and-tools/maltego/</guid><description>Maltego Maltego - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Hayabusa SIEM Fundamentals Splunk</description></item><item><title>MITRE ATT&amp;CK Mapping</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/detection-engineering/mitre-attck-mapping/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/detection-engineering/mitre-attck-mapping/</guid><description>MITRE ATT&amp;amp;CK Mapping MITRE ATT&amp;amp;CK Mapping - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Detection Engineering Fundamentals</description></item><item><title>SIEM and Tools</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/siem-and-tools/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/siem-and-tools/</guid><description>SIEM and Tools SIEM and Tools - security information and event management platforms and supporting tools used for log aggregation, correlation, and alerting.
Hayabusa Maltego SIEM Fundamentals Splunk Related Links: Detection Engineering Endpoint Security SOC Honeypots Threat Hunting Techniques</description></item><item><title>SIEM Fundamentals</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/siem-and-tools/siem-fundamentals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/siem-and-tools/siem-fundamentals/</guid><description>SIEM Fundamentals SIEM Fundamentals - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Hayabusa Maltego Splunk</description></item><item><title>SOC and Detection Engineering</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/</guid><description>SOC and Detection Engineering SOC and Detection Engineering - the processes and tools used by security operations centers to monitor, detect, triage, and respond to cyber threats.
Detection Engineering Endpoint Security SIEM and Tools SOC Honeypots Threat Hunting Techniques Related Links: Application Security Bash Burp Suite Cryptography Cybersecurity Encryption Firewalls Ghidra Hashing Incident Response and Forensics Information Security Models Linux Operating System Malware Analysis Malware Development Network Security Nginx Nmap Obfuscation and Detection Evasion Offensive Phishing Operations Ransomware Social Engineering Threat Modeling Windows Security and Administration Wireshark</description></item><item><title>SOC Honeypots</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/soc-honeypots/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/soc-honeypots/</guid><description>SOC Honeypots SOC Honeypots - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Detection Engineering Endpoint Security SIEM and Tools Threat Hunting Techniques</description></item><item><title>Splunk</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/siem-and-tools/splunk/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/siem-and-tools/splunk/</guid><description>Splunk Splunk - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Hayabusa Maltego SIEM Fundamentals</description></item><item><title>Threat Hunting Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/threat-hunting-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/soc-and-detection-engineering/threat-hunting-techniques/</guid><description>Threat Hunting Techniques Threat Hunting Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Detection Engineering Endpoint Security SIEM and Tools SOC Honeypots</description></item></channel></rss>