Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
2,687 results
This video reviews some basic instructions for installing Bro as a cluster configuration. Find more documentation here: ...
4,252 views
10 years ago
If your network architecture is largely unmapped, unmonitored and unmanned then you have a significant security risk you need to ...
1,420 views
6 years ago
An introductory overview of the threat hunting capabilities of the Zeek Network Security Monitor (formerly known as Bro), with ...
34,868 views
Security analysts rely on network data for ground truth in incident response and threat hunting, but the prevalence of encryption ...
2,079 views
5 years ago
Illuminate lateral movement in networks where an administrative tool is abused to maintain persistence. Corelight's built-in tool ...
883 views
Learn how the Zeek/Bro Network Security Monitor offers deep traffic insight, accelerates incident response & unlocks new threat ...
25,234 views
Tune into this webcast to hear from world-class network security operators as they dig into Corelight and the MITRE ATT&CK ...
4,524 views
Discover the power of the world's best network security monitor, Zeek, and how Corelight makes it much simpler to use. Find out ...
97,997 views
3 years ago
This video is a summary of BroControl's most common and useful commands in Bro v2.3.2 and below. Full command reference ...
3,745 views
Techniques, tactics, and procedures (TTPs) are useful for characterizing patterns of adversary behavior, such as sending a ...
12,540 views
This video goes into more detail about log mining, this time focusing on efficiency. You can find the cf tool we used in the video ...
2,627 views
To conduct hunting operations, threat hunters need to make quick sense of their environment. Since nearly all attacks must cross ...
5,310 views
4 years ago
In this short video we'll show you how to stream data from Zeek, a popular intrusion detection system, into the Neo4j graph ...
3,119 views
Interested in finding lateral movement in your environment? Needing better east-west traffic visibility? You can with MITRE ...
939 views
In this video, we take you step-by-step through the process of installing Zeek (formerly Bro) on Ubuntu and demonstrate how to ...
262 views
1 month ago
You may know that Zeek (formerly Bro) can uncover indicators of compromise and discover adversary lateral movement by ...
1,302 views
Nearly all cyberattacks must cross the network, but security analysts often struggle to make quick sense of traffic at scale for ...
627 views
With the right tools and some basic guidance, threat hunting is more accessible than you might think. This webcast and optional ...
4,340 views
Put defenders on top with alerts integrated into evidence. Corelight delivers the foundation next-level incident response by ...
14,586 views
Watch this webcast to learn about how security professionals at major universities deploy, use and benefit from the Zeek Network ...
646 views