YoVDO

Bad Guys Look Just Like You

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Privileged Access Management Courses Privilege Escalation Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a 20-minute conference talk from GrrCon 2016 that delves into the critical issue of privileged credentials and their role in cybersecurity. Learn about the 30 Day Cybersecurity Sprint Memo and how privilege escalation enables asset escalation. Discover the mission of control, visibility, and detection in cybersecurity, and understand how CyberArk breaks the attack chain. Gain insights into primary recommendations and comprehensive controls on privileged activity, concluding with actionable steps to implement immediately for improved security.

Syllabus

Intro
Privileged Credentials are Everywhere
30 Day Cybersecurity Sprint Memo
Privilege Escalation Enables Asset Escalation
Our Mission: Control
Our Mission: Visibility
Our Mission: Detection
CyberArk Breaks the Attack Chain
Primary Recommendations
Comprehensive Controls on Privileged Activity
What to do NOW


Related Courses

CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent
Enterprise Security Fundamentals
Microsoft via edX
Penetration Testing - Post Exploitation
New York University (NYU) via edX
Ultimate Ethical Hacking and Penetration Testing (UEH)
Udemy
Hands-on Penetration Testing Labs 4.0
Udemy