Applying OODA and Feedback Loops to Security Processes
Offered By: RSA Conference via YouTube
Course Description
Overview
Syllabus
Intro
Feedback Basics
Feedback Abstraction
The Premises of Feedback in Networks
SCADA Feedback
World's Largest Feedback Network
Where is Network Security Feedback?
OODA Loop Feedback
OODA With More Feedback
Pen-testers understand OODA intuitively
OODA in Learning: Positive Feedback
Synaptic Weighting in Neural Networks
Feedback Enables Metrics
Door Alarms with Feedback
Banking Verification with OOB Feedback
My Wife's Car Does This
Feedback in a Security Process (with time)
Feedback Based Truth Table
Testing Vendor Claims with Feedback
Using Feedback to Measure Security Performance
OODA Loop Detection
Add Negative Time
Feedback for Phishing
Stopping DDoS with Feedback
Measuring DDoS Products
Adding an OOB Channel
When Primary Comm is DOS'd
The Planet
Two DDoS Architectures w/OOB Feedback
Feedforward & Negative Time
1st Hop DDoS Protection
Multi-Tier Feedback (DDoS)
A Few Network Security Feedback Tenets
What Can You Do Now?
Taught by
RSA Conference
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Proactive Computer Security
University of Colorado System via Coursera Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Hacker101
HackerOne via Independent CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent