Becoming Mallory - Network Attack Techniques
Offered By: YouTube
Course Description
Overview
Explore the intricacies of network security and man-in-the-middle attacks in this 53-minute conference talk from Derbycon 2012. Delve into Eric Milam's presentation "Becoming Mallory" as he uncovers the techniques and strategies employed by malicious actors to intercept and manipulate network traffic. Gain valuable insights into the mindset of attackers and learn how to better protect your systems against these sophisticated threats. Discover the importance of understanding adversarial tactics to strengthen your organization's cybersecurity posture.
Syllabus
4 3 4 Eric Milam Becoming Mallory
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network