YoVDO

Breach Assessments - Are You Owned? You Can Find Out!

Offered By: LASCON via YouTube

Tags

LASCON Courses Cybersecurity Courses Active Directory Courses Incident Response Courses Telemetry Courses

Course Description

Overview

Explore techniques for detecting and analyzing network breaches in this 45-minute conference talk from LASCON. Learn how to identify anomalous behavior, capture host images, and determine ongoing malware and hacker activity. Gain insights from experienced Red Team members as they share their expertise in Blue Team activities. Discover approaches for locating suspicious network activity, analyzing it with certainty, and eradicating threats. Cover topics such as incident response, entry points, telemetry, Active Directory, content filtering, general traffic analysis, human activity detection, and domain account monitoring. Understand common problems, assess the value of breach assessments, identify gaps in security, and explore future developments in cybersecurity. Equip yourself with the knowledge to answer critical questions about your organization's security posture and ability to detect ongoing attacks.

Syllabus

Introduction
What is Incident Response
Entry Points
Telemetry
Active Directory
Content Filtering
General Traffic
Human Activity
Domain Accounts
Problems
Worth it
Gaps
Whats next


Taught by

LASCON

Related Courses

Building Cloud Apps with Microsoft Azure - Part 3
Microsoft via edX
Microsoft DevOps Solutions: Designing and Implementing Telemetry
Pluralsight
Microsoft Azure Developer: Advanced Troubleshooting
Pluralsight
Spring: Spring Cloud
LinkedIn Learning
Hybrid Cloud Service Mesh with Anthos en Français
Google Cloud via Coursera