Preventing Credential Theft Lateral Movement After Initial Compromise
Offered By: YouTube
Course Description
Overview
Explore techniques for preventing credential theft and lateral movement after initial compromise in this BSides Cleveland 2016 conference talk. Delve into topics such as red team strategies, secure configuration, Netbios, and ARP spoofing. Learn about the importance of audits, the concept of honey users, and the potential risks associated with the dark web. Gain insights from live demonstrations and practical examples to enhance your understanding of cybersecurity defense mechanisms.
Syllabus
Intro
Overview
Slides
Im not normal
The first day of reckoning
Red Team
Homer Simpson
Why are we doing this
Use side
Audits
Secure Configuration
Netbios
Demo
Its not magic
Live demo
The dark web
ARP spoofing
A caution
wretch32
honey users
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network