YoVDO

Breach Assessments - Are You Owned? You Can Find Out!

Offered By: LASCON via YouTube

Tags

LASCON Courses Cybersecurity Courses Active Directory Courses Incident Response Courses Telemetry Courses

Course Description

Overview

Explore techniques for detecting and analyzing network breaches in this 45-minute conference talk from LASCON. Learn how to identify anomalous behavior, capture host images, and determine ongoing malware and hacker activity. Gain insights from experienced Red Team members as they share their expertise in Blue Team activities. Discover approaches for locating suspicious network activity, analyzing it with certainty, and eradicating threats. Cover topics such as incident response, entry points, telemetry, Active Directory, content filtering, general traffic analysis, human activity detection, and domain account monitoring. Understand common problems, assess the value of breach assessments, identify gaps in security, and explore future developments in cybersecurity. Equip yourself with the knowledge to answer critical questions about your organization's security posture and ability to detect ongoing attacks.

Syllabus

Introduction
What is Incident Response
Entry Points
Telemetry
Active Directory
Content Filtering
General Traffic
Human Activity
Domain Accounts
Problems
Worth it
Gaps
Whats next


Taught by

LASCON

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network