Advanced Breaches of 2013 vs Behavioral Detection - GrrCON 2014
Offered By: YouTube
Course Description
Overview
Explore advanced cybersecurity breaches from 2013 and learn about behavioral detection techniques in this 49-minute conference talk. Delve into topics such as NetFlow, Silk, signature-based detection, metadata analysis, and behavioral analytics. Examine real-world case studies involving data disclosure, organized criminals, and state-sponsored attacks. Gain insights into traffic analysis, incident response, and advanced threat detection methods to enhance your organization's security posture.
Syllabus
Introduction
Definitions
NetFlow
Silk
Magic Quadrant
Signature Based Detection
Metadata
Boolean Detection
Behavioral Analysis
Anomaly Detection
Algorithmic Detection
Histograms
Service Type
Ukraine
Data disclosure
The Customer
Organized Criminals
Trade Secret Deal
Data Leaving Network
State Sponsored Attack
Address Scanning
Traffic Graph
Incidents
Related Courses
Proactive Computer SecurityUniversity of Colorado System via Coursera Security in Office 365
Microsoft via edX Threat Detection: Planning for a Secure Enterprise
Microsoft via edX Cyber Threat Intelligence
IBM via Coursera Security Analyst Fundamentals
IBM via Coursera