Data Transforming Your Sewage into Signatures
Offered By: BruCON Security Conference via YouTube
Course Description
Overview
Explore the process of transforming seemingly useless data into valuable security signatures in this conference talk from BruCON Security Conference. Discover how honeypots relate to traditional security controls and their unique cost considerations. Learn to build an affordable honeypot and extract meaningful insights from its basic output. Delve into advanced techniques for uncovering hidden value in large datasets through factorization and data transformation. Gain practical knowledge on turning unexpected findings into useful security tools, all while enjoying a lighthearted approach to data analysis in the field of information security.
Syllabus
BruCON 0x06 - Data transforming your sewage into signatures - Adam Schoeman
Taught by
BruCON Security Conference
Related Courses
Cyberhacker Series: Honeypots, IDS and FW'sUdemy Curso de Introducción a la Seguridad Informática desde Cero!
Udemy Kali Linux Tutorial in Hindi
YouTube Data-Driven Network Security Essentials
LinkedIn Learning Ethical Hacking: Evading IDS, Firewalls, and Honeypots
LinkedIn Learning