Start with the BPT Then Worry About the APT - Lecture 1
Offered By: YouTube
Course Description
Overview
Explore essential cybersecurity strategies in this 38-minute conference talk from ShowMeCon. Learn why most attacks are not sophisticated and how to effectively restrict inbound traffic. Dive into web application security, system hardening techniques, and the top 4 controls for enhanced protection. Discover the importance of memory analysis and familiarize yourself with various tools, including EMAT. Gain insights into securing Server 2008 and Server 2012 environments, as well as mobile device security. Conclude with a broader perspective on internet security to strengthen your overall defense posture.
Syllabus
Intro
Most attacks are not sophisticated
Restricting inbound traffic
Web applications
Harden your systems
Top 4 controls
Memory analysis
Memory analysis tools
EMAT
Server 2008
Server 2012
Phones
Internet
Related Courses
Authentication & Authorization: OAuthUdacity Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera Web Application Development: Security
University of New Mexico via Coursera Hacking and Patching
University of Colorado System via Coursera Fundamentals of Computer Network Security
University of Colorado System via Coursera