YoVDO

Early Detection through Deception

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Security BSides Courses Metadata Courses Threat Detection Courses Credential Theft Courses Spear Phishing Courses

Course Description

Overview

Explore early detection techniques through deception in cybersecurity with Jason Nester's 57-minute conference talk from BSides Cleveland 2019. Delve into the concept of deception, its advantages and challenges, and practical implementation strategies. Learn about various deceptive scenarios, including foreign devices on networks, compromised trusted systems, and internet manipulation. Discover advanced deception tactics like honey badger systems, deceptive metadata, and countering spear-phishing attempts. Gain insights into the ongoing cat-and-mouse game between attackers and defenders, and participate in a Q&A session to further enhance your understanding of this critical cybersecurity approach.

Syllabus

Intro
What is Deception?
All Rainbows and Unicorns?
Before You Begin...
Gimme Some Examples
Foreign Device on Network
Compromised Trusted System
Messing With the Internet
MOAR DECEPTION
For Example...
Honey Badger Don't Give A...
Deceptive Metadata
Spear-phishing / Credential Theft
The Cat and Mouse Game Continues
Questions?


Related Courses

Metadata: Organizing and Discovering Information
The University of North Carolina at Chapel Hill via Coursera
Gérer les documents numériques : maîtriser les risques
CNAM via France Université Numerique
Research Data Management and Sharing
The University of North Carolina at Chapel Hill via Coursera
SharePoint Enterprise Content Management
Microsoft via edX
Configuration Management on Google Cloud Platform
Google via Coursera