Computer Science

​Incident Response and Endpoint Monitoring using Velociraptor: In this project, the researcher will be required to configure and perform network intrusion and cyber incident response using Velociraptor open-source SIEM set up on a vulnerable Windows PC virtual machine. You will be required to also configure ​‌‍‍‍‌‍‌‍‌‍‍‍‌‌‌‍‍‌‌‍​a Linux server which will be used to identify different attack signatures. Also I will be given the weaknesses and strengths of velociraptor comparing to splunk application

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: