Python and cyber security

Python and cyber security

Investigating cyber security incidents with Python. Pandas can be used to normalize data from different log sources and analyze the resultant data. When dealing with large volumes of data, analysis becomes more complicated. This is because issues of storage and processing speed will arise. You may need to leverage the SIEM tool and cloud security … Read more

Jupytor notebook and doing an investigation

Jupytor

Knowledge required to use the Jupytor notebook Data analysis and doing Investigations with Jupytor notebooks really make the life of any data analyst or cyber security analyst easier. Nevertheless, we need to be aware of the following details before using the tool. Having specific domain knowledge is critical. Take a look at the analysis done … Read more

True Positive Negative False Positive Negative Alerts

True Positive True Negative False Positive False Negative

Types of Alerts: True Positive, True Negative, False Positive, False Negative In security, whether it is physical or cyber security, the alerts are basically 4 types. here they are listed. Security operation centers in cyber security focus on reducing false positives to improve efficiency. True Positive: Alert triggered, Really the incident happened. True Negative: No … Read more

Technology: Router, Interfaces, Ports

Routers

What are Routers, Interfaces, and their Physical ports? Computer networks are designed based on the OSI model. The OSI model has 7 layers out of which three are the physical layer, the data link layer, and the network layer, which usually refers to hardware layers, or where physical devices+software are deployed. The other 4 layers … Read more

Duurzame yoga handdoeken worden gemaakt van een verscheidenheid aan milieuvriendelijke materialen. Diamond membership digital expert advance course rs99,999 one year fee.