I hope you enjoyed the first session - that's just a taster of the amazing content we've got for you in the next couple of weeks!
There were a couple of resources mentioned in the session which I've listed below for reference in case:
For file hashing, Greg used these commands:
And to get your external IP, Greg recommended using
When we were recording Greg and Mat's video, we realised we had even more that we wanted to share with you, so I'm pleased to include below the 'bonus' footage from session 1 - Thinking Like A Threat Hunter. In it, Greg and Mat talk about who performs threat hunting, signal prioritization and the various adversarial tactics attackers use.
Take a look at the link below, and get yourself ready for tomorrow's session; Threat Journey: Running Code on Remote Systems. See you there!
Good session, some of the slides were pixelated and blurry. Fine for large font, not so much for slides with smaller font. Maybe it won't be blurry on the recording?
Hi Michael, sorry to hear that it wasn't displaying well for you - Zoom can sometimes restrict the quality based on local bandwidth.
I'll post the recording later today and that will have the original, HD video in it.
Nick Fisher will you be uploading the academy sessions as well as the 'bonus' content? Some of my colleagues have expressed an interesting reviewing this material after the event. Will you be making the slide decks available too?
Yes, the session from yesterday is uploading right now - I'll post on here as soon as they're ready on the on-demand page.
We won't be sharing the slide-decks themselves, but you can see all of the content in the video.