Separating Security Intelligence from Security FUD
Offered By: YouTube
Course Description
Overview
Explore a comprehensive analysis of security intelligence and its distinction from fear, uncertainty, and doubt (FUD) in this 48-minute conference talk from Derbycon 2012. Delve into topics such as security theater, password changes, firewall logs, and threat intelligence. Learn about various tools and metrics used in security intelligence, including code quality assessment and data collection methods. Examine the role of penetration testing and security onion in gathering valuable insights. Discuss the impact of bias on results and consider the potential disadvantages of security intelligence approaches. Gain practical knowledge to enhance your understanding of effective security practices and separate fact from fiction in the cybersecurity landscape.
Syllabus
Intro
Security Theater
Password Changes
Security Intelligence
Firewall Logs
Tools
Metrics
Code Quality
Collecting data
Hector
Pentest
Security Onion
Threat Intelligence
Bias
Results
Disadvantages
Conclusion
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Proactive Computer Security
University of Colorado System via Coursera Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Hacker101
HackerOne via Independent CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent