ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

10,060 results

Trial & Error - Self Paced Learning
Analyzing Output from Network Security Monitoring Tools

Given a scenario, analyze data as part of security monitoring activities. Given an incident, analyze potential indicators of ...

18:03
Analyzing Output from Network Security Monitoring Tools

662 views

3 years ago

Lawrence Systems
Discover & Monitor Your Network with This Self-Hosted Open Source Tool

https://lawrence.video/ In this video, I walk through how to self-host NetAlertX, an open-source network discovery and monitoring ...

16:44
Discover & Monitor Your Network with This Self-Hosted Open Source Tool

148,375 views

8 months ago

foss-north
Reviving PortSentry: A Modern Approach to Network Security Monitoring - Marcus Hufvudsson

Talk details: https://foss-north.se/2025/speakers-and-talks.html#mhufvudsson Conference details: https://foss-north.se/2025/

28:57
Reviving PortSentry: A Modern Approach to Network Security Monitoring - Marcus Hufvudsson

34 views

9 months ago

Zeek
Zeek in Action, Video 10, Examining the Four Types of Network Security Monitoring Data

In episode 10 of Zeek in Action, Richard examines the four types of network security monitoring data: 1) full content data ("PCAP"), ...

25:05
Zeek in Action, Video 10, Examining the Four Types of Network Security Monitoring Data

2,518 views

4 years ago

Security Onion
Security Onion 2016: ICS/SCADA Network Security Monitoring in Difficult Scenarios - Robert Lee

Security Onion Conference 2016 Robert M. Lee - @RobertMLee Jon Lavender "ICS/SCADA Network Security Monitoring in ...

38:08
Security Onion 2016: ICS/SCADA Network Security Monitoring in Difficult Scenarios - Robert Lee

10,461 views

9 years ago

Lawrence Systems
Securing Surveillance Camera Networks

https://lawrence.video/synology Basic Setup and Configuring pfsense Firewall Rules For Home https://youtu.be/bjr0rm93uVA ...

9:05
Securing Surveillance Camera Networks

56,109 views

3 years ago

InfoSight, Inc
Network & Cyber Security by InfoSight (Managed 24/7 Network Security Monitoring)

Today's businesses require 24/7 network security monitoring for both external-facing and internal networks. From monitoring your ...

1:38
Network & Cyber Security by InfoSight (Managed 24/7 Network Security Monitoring)

182 views

9 years ago

Zeek
Zeek in Action, Video 1, Suspected Malware Compromise

The first video examining network traffic using Zeek and related applications is now available. This episode looks at a suspected ...

54:57
Zeek in Action, Video 1, Suspected Malware Compromise

25,412 views

4 years ago

Lawrence Systems
Self Hosted Threat Hunting: Build Your Own Security Lab with Security Onion

https://lawrence.video/ Build your own threat hunting lab at home! Learn how to set up a powerful Security Onion environment to ...

12:25
Self Hosted Threat Hunting: Build Your Own Security Lab with Security Onion

44,126 views

1 year ago

Zeek
vZW20 - Day 2 - Using Zeek in ESnet6 management network security monitoring - Scott Campbell

Summary: ESnet is building a greenfield implementation for its next generation network. This presentation describes how we are ...

19:04
vZW20 - Day 2 - Using Zeek in ESnet6 management network security monitoring - Scott Campbell

211 views

5 years ago

Avesta Fahimipour
Network Security Monitoring Part 1 - Layer 2 & IPv4

Hello everyone my name is Avesta Fahimipour As you may already know free defensive cyber security courses are rare so i ...

22:21
Network Security Monitoring Part 1 - Layer 2 & IPv4

53 views

3 years ago

Lawrence Systems
My Thoughts on the Firewalla Firewall...

https://lawrence.video/pfsense Ross Video Review https://youtu.be/WRxv81ZLpaA Stacey on IOT Review ...

8:05
My Thoughts on the Firewalla Firewall...

92,277 views

2 years ago

media.ccc.de
Introduction to (home) network security.

https://media.ccc.de/v/Camp2019-10225-introduction_to_home_network_security A beginner-friendly guide to network ...

41:06
Introduction to (home) network security.

5,251 views

6 years ago

UTD CSG
Network Security

Presenter: generic, Jake An overview of Network Security, going over securing network infrastructure, firewalls, networking ...

59:02
Network Security

358 views

7 years ago

AppSec California
Continuous Cloud Security Monitoring (CCSM) - Michael Wylie

https://appseccalifornia.org/ When I first started working with AWS, there were a handful of core services. Since then, AWS has ...

51:49
Continuous Cloud Security Monitoring (CCSM) - Michael Wylie

1,097 views

5 years ago

media.ccc.de
35C3 -  Sneaking In Network Security

https://media.ccc.de/v/35c3-9603-sneaking_in_network_security Enforcing strong network segmentation, without anyone noticing ...

1:00:53
35C3 - Sneaking In Network Security

11,111 views

7 years ago

Free and Open Source Software Conference (FrOSCon) e.V.
Ralf C. Staudemeyer: Zero-cost security monitoring

http://programm.froscon.de/2014/events/1404.html ...

47:06
Ralf C. Staudemeyer: Zero-cost security monitoring

356 views

11 years ago

BSidesSLC
BSidesSLC 2017 -- James Dickenson & Chris Tilley -- Network Security Monitoring Product Evaluation

Selection of a network security monitoring (NSM) product can be a difficult process and proper instrumentation is critical to the ...

54:15
BSidesSLC 2017 -- James Dickenson & Chris Tilley -- Network Security Monitoring Product Evaluation

60 views

8 years ago

Jeenn Solutions
Master SNMP Protocol: Secure Network Management and Monitoring | Network Security Tutorial

Unlock the full potential of SNMP (Simple Network Management Protocol) in this comprehensive tutorial. Learn how SNMP plays ...

0:42
Master SNMP Protocol: Secure Network Management and Monitoring | Network Security Tutorial

30 views

1 year ago

Wisc-Online
Intrusion Detection Systems

Explore what these are, how they're configured, and the types of protection they provide.

5:45
Intrusion Detection Systems

50,616 views

9 years ago

EduSense
5 2 1 Data Monitoring

... from network devices or from terminal system that provides services data monitoring and Analysis can review network security ...

32:51
5 2 1 Data Monitoring

74 views

2 years ago

Avesta Fahimipour
Network Security Monitoring Part 3 -  DNS & HTTP & HTTPS

If you have any questions feel free to contact me : fahimipour dot avesta at gmail dot com Github: https://github.com/Avesta-FA If ...

14:48
Network Security Monitoring Part 3 - DNS & HTTP & HTTPS

23 views

3 years ago

Tom Olzak
Communications and Network Security Part 19 – Defense in Depth

Review the Table of Contents below. In this lesson, we step through the security layers needed to protect sensitive data and highly ...

8:14
Communications and Network Security Part 19 – Defense in Depth

654 views

3 years ago

Cooper
How To Better Integrate Continuous Improvement Into Security Monitoring - Desiree Sacher

... usual distinction that is made if you are analyzing an event I'm talking about security monitoring here and most often the process ...

21:55
How To Better Integrate Continuous Improvement Into Security Monitoring - Desiree Sacher

1,440 views

6 years ago

NSRC Network Startup Resource Center
Campus Network Security: Network Monitoring & Management

In this section about campus network security, we're going to go into some detail about network monitoring and management.

12:32
Campus Network Security: Network Monitoring & Management

580 views

4 years ago