YoVDO

Application Whitelisting: Preventing Unknown Software Execution

Offered By: Linux Foundation via YouTube

Tags

Linux Security Courses Access Control Courses Intrusion Detection Systems Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore application whitelisting as an effective method for preventing unknown software execution in this 47-minute Linux Foundation conference talk by Steven Grubb from Red Hat. Delve into an open-source implementation, examining various application execution methods and policy design. Learn how to leverage application whitelisting daemon information in real-time to maintain system integrity. Discover the broader security context and strategy, including Common Criteria Requirements, ATTACK to Kill Chain Mapping, and mobile code examples. Examine attack points, file access monitoring techniques, and access control policies. Gain insights into fapolicyd design, safety measures, and sources of trust. Watch a demo, analyze statistics reports, and understand fapolicyd coverage. Explore short-term improvements and the IDS Ensemble Model for a comprehensive understanding of application whitelisting in system security.

Syllabus

SECURITY
Whitelisting Basics
Common Criteria Requirements
Brief Comparison
ATTACK to Kill Chain Mapping
How programs execute
Mobile Code example
Attack points
How to monitor file access?
Fanotify Event
Access Control Policy
Subject statements
Sample Policy
Shipped policy design goals
Fapolicyd Design
Safety Measures
Sources of Trust
Top level SWID tag example
Demo
Statistics report
Fapolicyd coverage
Refinements
Short term improvements
Unifying the pieces
IDS Ensemble Model


Taught by

Linux Foundation

Tags

Related Courses

Linux Server Management and Security
University of Colorado System via Coursera
Cybersecurity Roles, Processes & Operating System Security
IBM via Coursera
Operating Systems and Security
IBM via edX
Linux Security and Hardening, The Practical Security Guide.
Udemy
The Complete Cyber Security Course : Hackers Exposed!
Udemy