Bir Sosyal Sorumluluk Projesi- Kocaeli'de Bulunan Liselere bilgisayar mühendisliğinde kariyer olanakları ile ilgili çalışma
( Bilenler bilmeyenlere yol gösteriyor, bu şekilde diğerleri de öğreniyor.) Doğru Tercih ile Bilgisayar Mühendisliğinde Kariyer
" Bu döküman 2015-2016" eğitim öğretim yılında Kocaeli Üniversitesi Bilgisayar Müh." verilen Mobil programlama dersi ile ilgili öğrenciler tarafından hazırlanmış soruları içermektedir. Bazı sorularda yanlışlık olabilir.
Bir Sosyal Sorumluluk Projesi- Kocaeli'de Bulunan Liselere bilgisayar mühendisliğinde kariyer olanakları ile ilgili çalışma
( Bilenler bilmeyenlere yol gösteriyor, bu şekilde diğerleri de öğreniyor.) Doğru Tercih ile Bilgisayar Mühendisliğinde Kariyer
" Bu döküman 2015-2016" eğitim öğretim yılında Kocaeli Üniversitesi Bilgisayar Müh." verilen Mobil programlama dersi ile ilgili öğrenciler tarafından hazırlanmış soruları içermektedir. Bazı sorularda yanlışlık olabilir.
CISSA Lightning Talk - Building a Malware Analysis Lab on a Budgetchrissanders88
This presentation was originally given as a lightning talk for a Charleston ISSA meeting. I talk briefly about malware analysis, and how to get started with malware analysis on a budget using virtualization.
Minding the Metacognitive Gap - BSides NOLAchrissanders88
As security investigators, even those of us with a great deal of experience aren’t very good at identifying how we perform our jobs successful. Our inability to understand our own thought processes can be defined as a lack of metacognitive awareness, and it negatively impacts our ability to perform investigations efficiently, and to train new apprentice investigators. In this presentation, I’ll discuss the metacognitive gap as it relates to security investigators. This will include a discussion of dual process theory and the role of intuitive and reflective thinking, as well as modern research techniques such as eye gaze tracking that can help us become better as investigators and build better tools to support our endeavors.
In this presentation I discuss the need for better understanding of the human investigation process. I demonstrate the tool agnostic investigation simulator I developed to observe and collet investigation data, and discuss results from some of these experiments.
BSA2016 - Honeypots for Network Security Monitoringchrissanders88
At the BSides Augusta 2016 conference, I presented the economic challenges of defensive security and how honeypots can be used for cost effective network security monitoring.
Applied Detection and Analysis Using Flow Data - MIRCon 2014chrissanders88
In this presentation, Chris Sanders and Jason Smith discuss the importance of using flow data for network security analysis. Flow data is discussed from the viewpoints of collection, detection, and analysis. We also discuss the FlowPlotter tool, and the use of FlowBAT, a graphical flow analysis GUI we've created.
This presentation was delivered at BSides Augusta in September 2016. The A/V portion is available here: https://www.youtube.com/watch?v=i6p71t9PFWM
Abstract:
"We can all agree that threat ("Evil") detection is an essential component of a functioning security monitoring program. Let's start thinking about how to take our tradecraft to the next level and hunt for insecure conditions ("Ways for Evil to do Evil things") that might allow threat actors to succeed in their mission.
This talk will run through some of the observations gathered during hunting expeditions inside the networks of multiple Fortune-ranked organizations and challenge you to expand your security operations thinking beyond signature-based detection.
- What is Hunting?
- How have we done it?
- What have we found, and what should be done about those findings?
- How might you achieve similar outcomes in your own environment?"
Speakers:
- Jacqueline Stokes (@find_evil) is an infosec enthusiast who picked up hacking as a preteen and cut her teeth over multiple years in Iraq. Her ongoing mission is to assess and advise clients on the most actionable and forward-thinking methods to improve detection, response, and containment of advanced threats. Jackie likes long walks on the beach, 90's nostalgia, and is the president and founding member of the Kevin Mandia Fan Club.
- Danny Akacki (@dakacki) was a Lead Analyst with GE Capitals' Applied Intelligence team prior to his employment with Mandiant, and now works for Bank of America's hunt team. He is a pragmatic optimist and believes we are probably screwed, but hopes we aren't. Danny enjoys finding evil on the weekends.
- Stephen Hinck (@stephenhinck) is a Senior Security Analyst at Oracle, Inc. Stephen stumbled into the information security world years ago and has since only managed to dig his way deeper to the rabbit hole. With a background in security operations, incident response and threat hunting, Stephen's experience is multi-faceted. Although he enjoys many things, he absolutely hates writing silly bios like this one.
Developing Analytic Technique and Defeating Cognitive Bias in Securitychrissanders88
In this presentation, I discuss the evolution to the analysis era in information security and the challenges associated with it. This includes several examples of cognitive biases and the negative effects they can have on the analysis process. I also discuss different analytic techniques that can enhance analysis such as differential diagnosis and relational investigation.
Using Canary Honeypots for Network Security Monitoringchrissanders88
In this presentation I talk about how honeypots that have more traditionally been used for research purposes can also be used as an effective part of a network security monitoring strategy.
CISSA Lightning Talk - Building a Malware Analysis Lab on a Budgetchrissanders88
This presentation was originally given as a lightning talk for a Charleston ISSA meeting. I talk briefly about malware analysis, and how to get started with malware analysis on a budget using virtualization.
Minding the Metacognitive Gap - BSides NOLAchrissanders88
As security investigators, even those of us with a great deal of experience aren’t very good at identifying how we perform our jobs successful. Our inability to understand our own thought processes can be defined as a lack of metacognitive awareness, and it negatively impacts our ability to perform investigations efficiently, and to train new apprentice investigators. In this presentation, I’ll discuss the metacognitive gap as it relates to security investigators. This will include a discussion of dual process theory and the role of intuitive and reflective thinking, as well as modern research techniques such as eye gaze tracking that can help us become better as investigators and build better tools to support our endeavors.
In this presentation I discuss the need for better understanding of the human investigation process. I demonstrate the tool agnostic investigation simulator I developed to observe and collet investigation data, and discuss results from some of these experiments.
BSA2016 - Honeypots for Network Security Monitoringchrissanders88
At the BSides Augusta 2016 conference, I presented the economic challenges of defensive security and how honeypots can be used for cost effective network security monitoring.
Applied Detection and Analysis Using Flow Data - MIRCon 2014chrissanders88
In this presentation, Chris Sanders and Jason Smith discuss the importance of using flow data for network security analysis. Flow data is discussed from the viewpoints of collection, detection, and analysis. We also discuss the FlowPlotter tool, and the use of FlowBAT, a graphical flow analysis GUI we've created.
This presentation was delivered at BSides Augusta in September 2016. The A/V portion is available here: https://www.youtube.com/watch?v=i6p71t9PFWM
Abstract:
"We can all agree that threat ("Evil") detection is an essential component of a functioning security monitoring program. Let's start thinking about how to take our tradecraft to the next level and hunt for insecure conditions ("Ways for Evil to do Evil things") that might allow threat actors to succeed in their mission.
This talk will run through some of the observations gathered during hunting expeditions inside the networks of multiple Fortune-ranked organizations and challenge you to expand your security operations thinking beyond signature-based detection.
- What is Hunting?
- How have we done it?
- What have we found, and what should be done about those findings?
- How might you achieve similar outcomes in your own environment?"
Speakers:
- Jacqueline Stokes (@find_evil) is an infosec enthusiast who picked up hacking as a preteen and cut her teeth over multiple years in Iraq. Her ongoing mission is to assess and advise clients on the most actionable and forward-thinking methods to improve detection, response, and containment of advanced threats. Jackie likes long walks on the beach, 90's nostalgia, and is the president and founding member of the Kevin Mandia Fan Club.
- Danny Akacki (@dakacki) was a Lead Analyst with GE Capitals' Applied Intelligence team prior to his employment with Mandiant, and now works for Bank of America's hunt team. He is a pragmatic optimist and believes we are probably screwed, but hopes we aren't. Danny enjoys finding evil on the weekends.
- Stephen Hinck (@stephenhinck) is a Senior Security Analyst at Oracle, Inc. Stephen stumbled into the information security world years ago and has since only managed to dig his way deeper to the rabbit hole. With a background in security operations, incident response and threat hunting, Stephen's experience is multi-faceted. Although he enjoys many things, he absolutely hates writing silly bios like this one.
Developing Analytic Technique and Defeating Cognitive Bias in Securitychrissanders88
In this presentation, I discuss the evolution to the analysis era in information security and the challenges associated with it. This includes several examples of cognitive biases and the negative effects they can have on the analysis process. I also discuss different analytic techniques that can enhance analysis such as differential diagnosis and relational investigation.
Using Canary Honeypots for Network Security Monitoringchrissanders88
In this presentation I talk about how honeypots that have more traditionally been used for research purposes can also be used as an effective part of a network security monitoring strategy.
21. Fotoğrafların devamı ve daha fazlası
https://www.
facebook.
com/KouBilgisayar/ph
otos_stream
22. Gelecekte?
Php ve Web Uygulama Dersleri
Bilgisayar ve Ağ Güvenliği
Open Source ve Linux Dersleri
C Dersleri ve Sizden Gelen Talepler
Ve daha fazlası...