YoVDO

Data Transforming Your Sewage into Signatures

Offered By: BruCON Security Conference via YouTube

Tags

BruCON Courses Data Analysis Courses Cybersecurity Courses Data Transformation Courses Honeypots Courses

Course Description

Overview

Explore the process of transforming seemingly useless data into valuable security signatures in this conference talk from BruCON Security Conference. Discover how honeypots relate to traditional security controls and their unique cost considerations. Learn to build an affordable honeypot and extract meaningful insights from its basic output. Delve into advanced techniques for uncovering hidden value in large datasets through factorization and data transformation. Gain practical knowledge on turning unexpected findings into useful security tools, all while enjoying a lighthearted approach to data analysis in the field of information security.

Syllabus

BruCON 0x06 - Data transforming your sewage into signatures - Adam Schoeman


Taught by

BruCON Security Conference

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network