Adversarial Emulation
Offered By: YouTube
Course Description
Overview
Explore adversarial emulation techniques in this 47-minute conference talk from Derbycon 2019. Delve into key concepts presented by Bryson Bort, covering communication protocols, the evolution of red teams, defense validation, and the distinctions between emulation and simulation. Learn about open-source options, PowerShell applications, ransomware tactics, networking activities, and lateral movement strategies. Gain insights into the people behind today's red teams and understand the goals of effective adversarial emulation in cybersecurity.
Syllabus
Introduction
Concept
Bryson
Communication Protocols
The People
Todays Red Team
What Do We Want
Defense Validation
Emulation vs Emulation
Good and Bad
Open Source Options
PowerShell
Ransomware
Networking activities
Lateral movement
Related Courses
Building Geospatial Apps on Postgres, PostGIS, & Citus at Large ScaleMicrosoft via YouTube Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube What's New in Grails 2.0
ChariotSolutions via YouTube Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube