Advanced Breaches of 2013 vs Behavioral Detection - GrrCON 2014
Offered By: YouTube
Course Description
Overview
Explore advanced cybersecurity breaches from 2013 and learn about behavioral detection techniques in this 49-minute conference talk. Delve into topics such as NetFlow, Silk, signature-based detection, metadata analysis, and behavioral analytics. Examine real-world case studies involving data disclosure, organized criminals, and state-sponsored attacks. Gain insights into traffic analysis, incident response, and advanced threat detection methods to enhance your organization's security posture.
Syllabus
Introduction
Definitions
NetFlow
Silk
Magic Quadrant
Signature Based Detection
Metadata
Boolean Detection
Behavioral Analysis
Anomaly Detection
Algorithmic Detection
Histograms
Service Type
Ukraine
Data disclosure
The Customer
Organized Criminals
Trade Secret Deal
Data Leaving Network
State Sponsored Attack
Address Scanning
Traffic Graph
Incidents
Related Courses
Extensions, Frameworks, & Integrations Used with ZeekPluralsight OSINT
Pennsylvania State University via YouTube Data Catalog: Qwik Start
Google Cloud via Coursera Data Artifacts, Analysis Results and Reporting in Autopsy
DFIRScience via YouTube Elucidata's Bulk RNA-Seq OmixAtlas - Effortless Dataset Discovery and Retrieval
Bioinformagician via YouTube