Advanced Breaches of 2013 vs Behavioral Detection - GrrCON 2014
Offered By: YouTube
Course Description
Overview
Explore advanced cybersecurity breaches from 2013 and learn about behavioral detection techniques in this 49-minute conference talk. Delve into topics such as NetFlow, Silk, signature-based detection, metadata analysis, and behavioral analytics. Examine real-world case studies involving data disclosure, organized criminals, and state-sponsored attacks. Gain insights into traffic analysis, incident response, and advanced threat detection methods to enhance your organization's security posture.
Syllabus
Introduction
Definitions
NetFlow
Silk
Magic Quadrant
Signature Based Detection
Metadata
Boolean Detection
Behavioral Analysis
Anomaly Detection
Algorithmic Detection
Histograms
Service Type
Ukraine
Data disclosure
The Customer
Organized Criminals
Trade Secret Deal
Data Leaving Network
State Sponsored Attack
Address Scanning
Traffic Graph
Incidents
Related Courses
An Introduction to Computer NetworksStanford University via Independent Computer Networks
University of Washington via Coursera Computer Networking
Georgia Institute of Technology via Udacity Cybersecurity and Its Ten Domains
University System of Georgia via Coursera Model Building and Validation
AT&T via Udacity