- Видео 363
- Просмотров 3 542 125
CYBERWOX
США
Добавлен 19 июл 2020
Hi, I'm Day. I'm on a mission to decode the fusion between engineering & life.
📧 day@cyberwox.com
All opinions are mine and not those of my employer.
📧 day@cyberwox.com
All opinions are mine and not those of my employer.
The Global Crowdstrike Outage (Different Perspective)
A different take on the Crowdstrike incident as an Incident Responder.
_____________
🧬 CYBERWOX RESOURCES
🔹Cyberwox Unplugged Newsletter: cyberwox.substack.com/
🔹Cyberwox Cybersecurity Notion Templates for planning your career: daycyberwox.gumroad.com/l/cyberlearningframework
🔹Cyberwox Best Entry-Level Cybersecurity Resume Template: daycyberwox.gumroad.com/l/cybersecurityresume
🔹Learn AWS Threat Detection with my LinkedIn Learning Course: www.linkedin.com/learning/introduction-to-aws-threat-detection/
_____________
⚙️ OTHER RESOURCES
🔹My Content Equipment, Book Recommendations & Desk Setup: www.amazon.com/shop/daycyberwox
_____________
⚡️JOIN CYBERWOX ACADEMY ON DISCORD!
discord.gg/cyberwoxacademy
___...
_____________
🧬 CYBERWOX RESOURCES
🔹Cyberwox Unplugged Newsletter: cyberwox.substack.com/
🔹Cyberwox Cybersecurity Notion Templates for planning your career: daycyberwox.gumroad.com/l/cyberlearningframework
🔹Cyberwox Best Entry-Level Cybersecurity Resume Template: daycyberwox.gumroad.com/l/cybersecurityresume
🔹Learn AWS Threat Detection with my LinkedIn Learning Course: www.linkedin.com/learning/introduction-to-aws-threat-detection/
_____________
⚙️ OTHER RESOURCES
🔹My Content Equipment, Book Recommendations & Desk Setup: www.amazon.com/shop/daycyberwox
_____________
⚡️JOIN CYBERWOX ACADEMY ON DISCORD!
discord.gg/cyberwoxacademy
___...
Просмотров: 1 228
Видео
Add-RoleGroupMember - Detecting Persistence in Microsoft Exchange ~ #DetectionOpportunities EP 6
Просмотров 481День назад
Learn how to decipher the Microsoft Unified Audit Log (UAL) from a Digital Forensics & Incident Response (DFIR) perspective with Purav Desai, an experienced M365/Azure Incident Responder. In today's video, we explore the Add-RoleGroupMember operation in Exchange Online. Purav's LinkedIn: www.linkedin.com/in/purav-da346393/ Deciphering UAL: github.com/PuravsPoint/DecipheringUAL Microsoft Applica...
From US Marine to Cybersecurity Analyst w/ David Huynh | #CyberStories EP 19
Просмотров 1,9 тыс.21 день назад
Today’s episode is with a friend and Cyberwox Community Manager, David Hyunh, and we discuss everything involving his evolution and transition from the US Marines to becoming a Cybersecurity Analyst. DAVID's STUFF: LinkedIn: www.linkedin.com/in/knowfatiguetech/ 🧬 CYBERWOX RESOURCES 🔹Cyber Stories Podcast: ruclips.net/p/PLDqMNdDvMsRkIPsQdNvRnT9wEEyl3hr-A&si=7GdfWfnGxYprWwly 🔷Day's Engineering Di...
the realities of becoming a cybersecurity engineer ~ Day's Engineering Diary EP10
Просмотров 3,8 тыс.Месяц назад
What no one tells you about the daily life of cybersecurity engineers. TIMESTAMPS: 00:00 Intro 00:59 Reality 1 01:46 Reality 2 03:21 Reality 3 06:09 Reality 4 09:38 Conclusion 🧬 CYBERWOX RESOURCES 🔹Cyberwox Unplugged Newsletter: cyberwox.substack.com/ 🔹Cyberwox Cybersecurity Notion Templates for planning your career: daycyberwox.gumroad.com/l/cyberlearningframework 🔹Cyberwox Best Entry-Level Cy...
Cybersecurity Engineering Careers: Endpoint, SIEM, Threat Intelligence & Automation | Part 2
Просмотров 1,7 тыс.Месяц назад
Cybersecurity Engineering Careers: Endpoint Security, SIEM Engineering, Threat Intelligence & Automation/SOAR Engineering TIMESTAMPS: 00:00 Intro 00:34 Endpoint Security Engineer 04:30 SIEM Engineer 08:40 Threat Intelligence Engineer 12:07 Security Automation/SOAR Engineer 15:30 Final Thoughts 🧬 CYBERWOX RESOURCES 🔹Cyberwox Unplugged Newsletter: cyberwox.substack.com/ 🔹Cyberwox Cybersecurity No...
New-RoleGroup - Detecting Privilege Escalation in Microsoft 365 ~ #DetectionOpportunities EP 5
Просмотров 1 тыс.Месяц назад
Learn how to decipher the Microsoft Unified Audit Log (UAL) from a Digital Forensics & Incident Response (DFIR) perspective with Purav Desai, an experienced M365/Azure Incident Responder. Purav's LinkedIn: www.linkedin.com/in/purav-da346393/ Deciphering UAL: github.com/PuravsPoint/DecipheringUAL TIMESTAMPS: 00:00 Intro 00:20 Deciphering New-RoleGroup 09:06 Key Fields 10:11 Deciphering with Exch...
DevSecOps - How To Securely Containerize A Python App With ChainGuard
Просмотров 1,5 тыс.Месяц назад
Get started with ChainGuard: go.chainguard.dev/3VKAAJK Try out this DevSecOps project and learn AWS, Infrastructure as Code (CloudFormation), docker, docker scout, docker files, container security, chainguard, bash, and python :) Chainguard Demo Repo: github.com/daycyberwox/chainguard-demo Chainguard Images: images.chainguard.dev/ Docker Setup: medium.com/@nifemi.sofowoke/configuring-a-3-node-d...
Microsoft 365 Forensics & Incident Response w/ Purav Desai ~ #DetectionOpportunities EP 4
Просмотров 1,6 тыс.Месяц назад
Learn how to decipher the Microsoft Unified Audit Log (UAL) from a Digital Forensics & Incident Response (DFIR) perspective with Purav Desai, an experienced M365/Azure Incident Responder. Purav's LinkedIn: www.linkedin.com/in/purav-da346393/ Deciphering UAL: github.com/PuravsPoint/DecipheringUAL Learn about auditing solutions in Microsoft Purview: learn.microsoft.com/en-us/purview/audit-solutio...
Investigating Microsoft Defender Bypass with Splunk - TryHackMe New Hire Old Artifacts
Просмотров 2 тыс.Месяц назад
TryHackMe New Hire Old Artifacts: tryhackme.com/r/room/newhireoldartifacts TIMESTAMPS: 00:00 Intro 01:28 Malicious Password Viewer 05:48 Suspicious Binaries 13:09 Outbound C2 Communication 16:41 Registry Key Manipulation - Defender Bypass 19:04 Killing Processes and Deleting Binaries 24:44 Windows Defender Tampering 29:43 Threat IDs? 35:13 Another Malicious Binary 41:14 DLL Sideloading 43:30 Ou...
From Olympic Athlete To Cloud Engineer w/ @REXTECH9 | #CyberStories EP 18
Просмотров 1,2 тыс.2 месяца назад
Today’s episode is with a friend, Ifeanyi Otuonye, and we discuss everything involving his past life as an Olympic Athlete and the journey to becoming a Cloud Engineer. IFEANYI's STUFF: LinkedIn: www.linkedin.com/in/ifeanyi-otuonye/ Twitter/X: x.com/ifeanyi_otuonye Blog/Medium: medium.com/@ifeanyiro 🧬 CYBERWOX RESOURCES 🔹Cyber Stories Podcast: ruclips.net/p/PLDqMNdDvMsRkIPsQdNvRnT9wEEyl3hr-A&si...
I Asked Cybersecurity Managers How To Get Hired
Просмотров 28 тыс.2 месяца назад
I Asked Cybersecurity Managers How To Get Hired
Python Strings, Variables & Inputs ~ Python for Cybersecurity 1
Просмотров 2,3 тыс.2 месяца назад
Python Strings, Variables & Inputs ~ Python for Cybersecurity 1
Learn Cybersecurity FASTER in 2024 - Trainings, Certifications & Courses
Просмотров 9 тыс.2 месяца назад
Learn Cybersecurity FASTER in 2024 - Trainings, Certifications & Courses
Investigating Microsoft Windows Exploitation and Malware Delivery with Splunk
Просмотров 1,3 тыс.2 месяца назад
Investigating Microsoft Windows Exploitation and Malware Delivery with Splunk
Modern Detection Engineering w/ Jimmy Vo | #CyberStories EP 16
Просмотров 1,6 тыс.3 месяца назад
Modern Detection Engineering w/ Jimmy Vo | #CyberStories EP 16
Cybersecurity Engineering Careers: CorpSec, Threat Detection & Incident Response Engineers | Part 1
Просмотров 4,5 тыс.3 месяца назад
Cybersecurity Engineering Careers: CorpSec, Threat Detection & Incident Response Engineers | Part 1
what i wish i knew before becoming a cybersecurity engineer ~ Day's Engineering Diary EP9
Просмотров 7 тыс.3 месяца назад
what i wish i knew before becoming a cybersecurity engineer ~ Day's Engineering Diary EP9
Analyzing Attacker Recon to Malware Installation with Splunk
Просмотров 1,3 тыс.4 месяца назад
Analyzing Attacker Recon to Malware Installation with Splunk
The Cybersecurity Incident Response Life Cycle Explained
Просмотров 1,6 тыс.4 месяца назад
The Cybersecurity Incident Response Life Cycle Explained
Investigating a Windows Intrusion Attack with Splunk | TryHackMe Investigating with Splunk
Просмотров 2,7 тыс.4 месяца назад
Investigating a Windows Intrusion Attack with Splunk | TryHackMe Investigating with Splunk
2024 Remote Cybersecurity Setup + Flexispot C7 Review
Просмотров 6 тыс.4 месяца назад
2024 Remote Cybersecurity Setup Flexispot C7 Review
Splunk Processing Language For Cybersecurity Investigations - TryHackMe Exploring SPL
Просмотров 2,4 тыс.4 месяца назад
Splunk Processing Language For Cybersecurity Investigations - TryHackMe Exploring SPL
Redline InfoStealer Malware Analysis with Wireshark & ANY.RUN
Просмотров 4,1 тыс.5 месяцев назад
Redline InfoStealer Malware Analysis with Wireshark & ANY.RUN
Splunk SIEM Basics for Cybersecurity - TryHackMe Splunk 101
Просмотров 2,8 тыс.5 месяцев назад
Splunk SIEM Basics for Cybersecurity - TryHackMe Splunk 101
how my cybersecurity career progressed fast ~ Day's Engineering Diary EP8
Просмотров 3,9 тыс.5 месяцев назад
how my cybersecurity career progressed fast ~ Day's Engineering Diary EP8
Malicious Cryptominer: Cybersecurity Investigation - TryHackMe Intro to SIEM
Просмотров 1,3 тыс.5 месяцев назад
Malicious Cryptominer: Cybersecurity Investigation - TryHackMe Intro to SIEM
The Future Of Online Cybersecurity: Browser Security
Просмотров 2,1 тыс.6 месяцев назад
The Future Of Online Cybersecurity: Browser Security
SIEM Capabilities for SOC Analysts, Threat Hunters, Detection Engineers & Incident Responders
Просмотров 2,7 тыс.6 месяцев назад
SIEM Capabilities for SOC Analysts, Threat Hunters, Detection Engineers & Incident Responders
What is a SIEM? (Security Information & Event Management)
Просмотров 13 тыс.6 месяцев назад
What is a SIEM? (Security Information & Event Management)
my cybersecurity career focus for 2024 ~ Day's Engineering Diary EP7
Просмотров 2,9 тыс.6 месяцев назад
my cybersecurity career focus for 2024 ~ Day's Engineering Diary EP7
This is good, so good! Thanks Izzy
@daycyberwox You you have an upgrade of this project? What about building this in the cloud and allow us to subcribe for a fee? This one requires lots of resource to setup. Thanks for all your effort.
21 🤯
Nah I’m learning a lot by using the Security+ labs. A lot of them are easy but the material they cover is very hands on and hard to get without having commercial grade equipment ( I have a stout home lab, but there’s no way I can afford some of the software
I took first time and got 848/900. Maybe you just stupid.
Im taking this now for WGUs Cloud Computing degree
I downloaded the VMWare but upon getting the machine to run, it asked me to install an Operating system cos it couldn't detect one. Where did I get it wrong in the installation process?
On a scale from 1-10, in your opinion, how boring is cybersecurity?
Without the conceptual you will have no practical so it’s a moot point.
It was rough. I look at my ticket queue and see 5 Azure VMs out and im like “shit im screwed and the only one in that works this client”
Yikes, that must’ve been insane :|
@@DayCyberwox thankfully everyone was off work so the impact was minimal but it was definitely scary especially knowing i was 30 minutes from clocking out
So it’s not fully necessary for me to learn how to configure SIEM, IDS and other apps as a Soc Analyst? What I should learn more is how to use them effectively??
I wouldn’t say not necessary because if you want to become a Security Engineer / SOC Engineer, you’ll need to learn those skills.
So it’s not fully necessary for me to learn how to configure SIEM, IDS and other apps as a Soc Analyst? What I should learn more is how to use them effectively??
I wouldn’t say not necessary because if you want to become a Security Engineer / SOC Engineer, you’ll need to learn those skills.
Can anybody point me in the right direction for projects to build that look really well on resumes ? From your own experience of course
Hi , I enjoy your content, but one thing I can't do is get a job . My cv is so bad. I don't know. I need 1v1 summary section. Please help. That is what is stopping me from getting independent, 21 currently still living my parents.
Join the discord! We’ve got resources for you :) www.discord.gg/cyberwoxacademy
I've been in similar situations so I have sympathy. I get outsiders laughing about it, but anyone in IT joking about it just haven't had enough experience being on the bad side of this incident and will eventually experience something like this. But to be fair, a lot of the laughing comes as a response to CrowdStrike's hubris.
Fair point, they (crowdstrike) played themselves in regard to that.
Very insightful! This is the mindset every incident responder should have . We are here to learn from past incidents, investigate- Remediate/mitigate to bring back normal business operations 👍
Yep, that’s what responders do.
@@DayCyberwox yes!
Awesome insights on the CrowdStrike incident! For individuals who may not be within cybersecurity, it's great to hear/see this end of the spectrum which contributes to the awareness of what can potentially happen. Responders have to figure out solutions quickly to support critical infrastructure and we have to give credit where credit is due. Truly an advocate for the community. Great work!
Thank you!
Can't agree with you here. There is a problem with this much impact occurring from one company cutting corners this is not just a whoopsy daisy and move on this absolutely needs to have a heavy hand placed on crowdstrike the level of negligence this took along with this being the second major outage caused by their ceo and crowdstrike absolutely ignoring the terms from Microsoft that allowed them to have this level of access there absolutely needs to be blame and repercussions this is like you building the best house a beautiful mansion and then your plumber comes and sets it on fire this is not the result of an accident this is the result of decisions made to actively not play be the rules
The consequence they’ll face is already happening, their stock’s dropped significantly, they might have to testify in congress, they’ve lost customer trust. All of that. Everyone can keep pointing fingers and everything but all I’m saying is the deed is done. The problem’s being fixed and the lessons are being learned. And also, don’t ever think there’s a perfect company out there that this can never happen to. Engineering at scale is difficult and this is a perfect example of a big mess up but don’t ever think anyone is immune to just as big of a mess up as this.
@@DayCyberwox Oh for sure I can't pan my workstation without seeing a dozen guilty parties but nothing on my desk is guilty of soft locking 8.6 million systems either..... what really sucks is I know that the big heads at cs are going to find a way to make their employees pay and inocent people are going to suffer, such is the way of the world also just because this is the new norm does not make it right wrong is still wrong we just have to accept more of it
@@DayCyberwox Also no disrepect intended your videos helped me alot towards getting started in infosec and without your info I would still be chasing my tail so much love
Great video discussing about your perspective our guy! Liked how you mentioned about sending positivity to those who are dealing with outages and not blaming those to make it worse, it’s already stressful that the incident happened so sending positivity really helps calm that anxiety. Definitely agree with your point that it’s important to understand that these are bound to happen and to be able to respond accordingly and overall communicate in the right manner to clean up the mess. Amazing detail, commentary and overall solid advice on how to deal with incidents. Great video!
Thanks Josh!
Thank you so much for saying this A LOT of people on SM commented about it and reaffirmed their biases and conspiracy theories about their distrust for computers and technology in general LOL.
Rightfully so tbh. Crowdstrike has quite the market share and market domination with regards to endpoint security 🤷🏽♂️
@@DayCyberwox YYYEESS! I think that's what scares me too bc they have a hand in so much so when their system fails so many vital things that we rely on go down lol
It scared me the other day lol
I can imagine🥲
how can one migrate to becoming a cloud network engirneer from a help desk role?
@MadeByGPS has several videos on help desk to cloud based roles! youtube.com/@madebygps
Hey Day! I was wondering, what is your setup for your videos? Are you syncing video and audio together in post or recording together? If so how?
👋🏽Hey! I record all of it at the same time using platforms like OBS and StreamYard.
13:09 when you say, they called you with an offer, what does this mean? Because I've been doing hourly pay my whole life and looking to transfer over. But I keep hearing the word offer and finally decided to ask.
A job offer :)
@@DayCyberwox but don't you talk about salaries during the interview?
Great vid. Would you have an extra option for an international student ?
None at the moment, but will make a video if anything comes up.
Checkout the Deciphering UAL project: github.com/PuravsPoint/DecipheringUAL
Good stuff
@@JohnandGiselle thank you🙌🏽
I Recently Obtained the Google Cybersecurtiy Cerificate and the CompTIA Sec+, Do you recommned that I go back and also get the A+ & Network+? I was planning on taking BTL1 Next. I am wanting to break into a SOC Analyst role then futher down the line specalize in Forensics DF/IR
Not necessarily but going over a course on both certifications wouldn’t hurt :)
Love this! Straight to the point
So you don’t work ?
All lies. I have Security+, Google Cybersecurity, and 12 years' experience and hiring managers won't even give me a phone interview. The industry is heavily gatekept. If you don't smell like a brewery or bowl of curry after a hard days work, good luck.
Great Work
Great and inspiring story!
I got BTL1 last year and am currently going through CCD by CyberDefenders. It has taught me a lot of things I didn't learn in BTL. Honestly, I think BTL1 is overrated compared to CCD or even CDSA.
Great video
@DAYCYBERWOX Hey, where did you go to school for cybersecurity?
CCD + CySa is the way to go. CCD for the practical skills and CySa for HR!
Need your help to get into cybersecurity, I am final year student can you connect with me??
Join the discord! discord.gg/cyberwoxacademy
Great content Day!
Thank you!
@@DayCyberwox Anytime
You need Network Chuck editing.
Great video describing the details about GRC. I'm currently work in Information Protection and looking to get into GRC.
Great convo.
Great video! I appreciate that you took the time to look at each person's background to provide context behind their suggestions. I completely agree with you that it's not impossible to land greater than an "entry level" role as your first job in cybersecurity, but you do have to be creative and put in the WORK to prove yourself.
the link doesnt exist anymore :(
Great video 💯💯
I like the onion analogy but I wouldn’t say that Cyber Sec is the very middle. More so an outer layer similar to networking.
Thank you, I mentioned that it might be closer to the core/center because its helpful/expected to be prerequisite knowledge in general (networking, cloud, IT Systems being optimal prerequisites). Or at the least, you would be more effective and optimized if you have the pre-requisite knowledge of the other IT practices.
Semper Fi, Devil! Love to hear stories like this. #MarineVet #LawEnforcement #JourneyIntoCyberSecurity
I was hoping to like and subscribe but after just 3 minutes of viewing you've successfully alienated me with the annoyingly choppy editing and crazy playback speed. It's like you've put this together with AI. Not sure what you're trying to achieve here but I'm not sticking around to find out .
Thats my brother!!!! ❤🙌🏻
@jenniferhuynh6217 Thanks, my brother too
1. Reality of Admin work 2. Reality of Painful work 3. Reality of Mental work 4. Reality of Compensation