Breach Assessments - Are You Owned? You Can Find Out!
Offered By: LASCON via YouTube
Course Description
Overview
Explore techniques for detecting and analyzing network breaches in this 45-minute conference talk from LASCON. Learn how to identify anomalous behavior, capture host images, and determine ongoing malware and hacker activity. Gain insights from experienced Red Team members as they share their expertise in Blue Team activities. Discover approaches for locating suspicious network activity, analyzing it with certainty, and eradicating threats. Cover topics such as incident response, entry points, telemetry, Active Directory, content filtering, general traffic analysis, human activity detection, and domain account monitoring. Understand common problems, assess the value of breach assessments, identify gaps in security, and explore future developments in cybersecurity. Equip yourself with the knowledge to answer critical questions about your organization's security posture and ability to detect ongoing attacks.
Syllabus
Introduction
What is Incident Response
Entry Points
Telemetry
Active Directory
Content Filtering
General Traffic
Human Activity
Domain Accounts
Problems
Worth it
Gaps
Whats next
Taught by
LASCON
Related Courses
Building Cloud Apps with Microsoft Azure - Part 3Microsoft via edX Microsoft DevOps Solutions: Designing and Implementing Telemetry
Pluralsight Microsoft Azure Developer: Advanced Troubleshooting
Pluralsight Spring: Spring Cloud
LinkedIn Learning Hybrid Cloud Service Mesh with Anthos en Français
Google Cloud via Coursera