Advanced Breaches of 2013 vs Behavioral Detection - GrrCON 2014
Offered By: YouTube
Course Description
Overview
Explore advanced cybersecurity breaches from 2013 and learn about behavioral detection techniques in this 49-minute conference talk. Delve into topics such as NetFlow, Silk, signature-based detection, metadata analysis, and behavioral analytics. Examine real-world case studies involving data disclosure, organized criminals, and state-sponsored attacks. Gain insights into traffic analysis, incident response, and advanced threat detection methods to enhance your organization's security posture.
Syllabus
Introduction
Definitions
NetFlow
Silk
Magic Quadrant
Signature Based Detection
Metadata
Boolean Detection
Behavioral Analysis
Anomaly Detection
Algorithmic Detection
Histograms
Service Type
Ukraine
Data disclosure
The Customer
Organized Criminals
Trade Secret Deal
Data Leaving Network
State Sponsored Attack
Address Scanning
Traffic Graph
Incidents
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network