Early Detection through Deception
Offered By: YouTube
Course Description
Overview
Explore early detection techniques through deception in cybersecurity with Jason Nester's 57-minute conference talk from BSides Cleveland 2019. Delve into the concept of deception, its advantages and challenges, and practical implementation strategies. Learn about various deceptive scenarios, including foreign devices on networks, compromised trusted systems, and internet manipulation. Discover advanced deception tactics like honey badger systems, deceptive metadata, and countering spear-phishing attempts. Gain insights into the ongoing cat-and-mouse game between attackers and defenders, and participate in a Q&A session to further enhance your understanding of this critical cybersecurity approach.
Syllabus
Intro
What is Deception?
All Rainbows and Unicorns?
Before You Begin...
Gimme Some Examples
Foreign Device on Network
Compromised Trusted System
Messing With the Internet
MOAR DECEPTION
For Example...
Honey Badger Don't Give A...
Deceptive Metadata
Spear-phishing / Credential Theft
The Cat and Mouse Game Continues
Questions?
Related Courses
Metadata: Organizing and Discovering InformationThe University of North Carolina at Chapel Hill via Coursera Gérer les documents numériques : maîtriser les risques
CNAM via France Université Numerique Research Data Management and Sharing
The University of North Carolina at Chapel Hill via Coursera SharePoint Enterprise Content Management
Microsoft via edX Configuration Management on Google Cloud Platform
Google via Coursera