YoVDO

Defense Evasion Modeling

Offered By: BSidesLV via YouTube

Tags

Security BSides Courses Cybersecurity Courses Threat Modeling Courses Endpoint Protection Courses

Course Description

Overview

Explore defense evasion modeling techniques in this 57-minute conference talk from BSidesLV 2013. Delve into new technologies, development processes, and tools for layered security. Evaluate the effectiveness of your defenses through threat modeling, transforms, and tuning of various security components including IPS, NGFW, and endpoint protection. Examine corporate infrastructure, exploit techniques, and threat protection strategies. Gain insights into NSS and macro approaches for enhancing overall security posture.

Syllabus

Introduction
New Technologies
Development Process
Tools
Layered Security
How effective are your defenses
Threat Modeling
Transforms
Tungsten
Tuning IPS
NGFW
IPS
Endpoint Protection
Corporate Infrastructure
Endpoint Protection Credit
Head Mask
Exploits
Bubble View
Threat Protection
Conclusions
NSS
Macro approaches


Taught by

BSidesLV

Related Courses

Cybersecurity Compliance Framework & System Administration
IBM via Coursera
IBM Cybersecurity Analyst
IBM via Coursera
Windows 10 Configuring (70-697): Plan and Implement Microsoft Intune
Pluralsight
Implementing Host Security in Microsoft Azure
Pluralsight
Microsoft Azure Security Engineer: Configure Advanced Security for Compute
Pluralsight