YoVDO

Building a Resiliency Program to Protect Business

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Penetration Testing Courses Compliance Courses Advanced Persistent Threats Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the concept of Adaptive Penetration Testing (APT2) and learn how to build a resilient program to protect businesses in this 44-minute conference talk from BSides Cleveland 2014. Delve into the history of hacking, examine Hollywood's romanticized portrayal of hackers, and understand the emergence of new attack types. Discover the APT2 concept, explore denial of threat scenarios, and analyze various attack vectors. Investigate the compliance problem, study real-world attack behaviors, and understand the rationale behind APT2. Compare compliance-based and business-driven penetration tests, examine the taxonomy of criminal attacks, and learn how to address advanced persistent threats. Gain insights into the APT Resiliency Model and acquire valuable knowledge to enhance your organization's cybersecurity posture.

Syllabus

Intro
A little about me
History of Hacking (Snapshot)
Hollywood's Romanticized "Hackers"
A New Type of Attack?
Adaptive Penetration Testing
APT2 Concept
Denial of Threat
We have created the Perfect Storm
Attack Vectors
The Compliance Problem
Attack Behavior (Welcome to Reality 101)
APT2 Rationale
APT Rationale
Case Study
Compliance Based Pen Tests
Business Driven Pen Tests
Where do you see business value?
Taxonomy of Criminal Attack
Attack Dimensions
Addressing the Advanced Persistent Threat
APT Resiliency Model
My Contact Information


Related Courses

Real-Time Cyber Threat Detection and Mitigation
New York University (NYU) via Coursera
Ciberseguridad: ataques y contramedidas
Universidad Rey Juan Carlos via Independent
Fundamentos de Ciberseguridad: un enfoque práctico
Inter-American Development Bank via edX
Cyber Security Advanced Persistent Threat Defender Preview
Udemy
Threat Intelligence: Cyber Threats and Kill Chain Methodology
Pluralsight