Start with the BPT Then Worry About the APT - Lecture 1
Offered By: YouTube
Course Description
Overview
Explore essential cybersecurity strategies in this 38-minute conference talk from ShowMeCon. Learn why most attacks are not sophisticated and how to effectively restrict inbound traffic. Dive into web application security, system hardening techniques, and the top 4 controls for enhanced protection. Discover the importance of memory analysis and familiarize yourself with various tools, including EMAT. Gain insights into securing Server 2008 and Server 2012 environments, as well as mobile device security. Conclude with a broader perspective on internet security to strengthen your overall defense posture.
Syllabus
Intro
Most attacks are not sophisticated
Restricting inbound traffic
Web applications
Harden your systems
Top 4 controls
Memory analysis
Memory analysis tools
EMAT
Server 2008
Server 2012
Phones
Internet
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network