YoVDO

Vulnerabilities in Application Whitelisting - Malware Case Studies

Offered By: YouTube

Tags

Malware Analysis Courses Cybersecurity Courses Threat Detection Courses Vulnerability Assessment Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore vulnerabilities in application whitelisting through malware case studies in this conference talk from BSidesLV 2013. Delve into Jared Sperl's analysis of real-world examples, uncovering weaknesses in whitelisting approaches and their exploitation by malicious actors. Gain insights into the limitations of application whitelisting as a security measure and learn about potential attack vectors that bypass these controls. Understand the implications for cybersecurity professionals and organizations relying on whitelisting techniques for protection against malware threats.

Syllabus

BSidesLV 2013 3 2 4 Vulnerabilities in Application Whitelisting Malware Case Studies Jared Sperl


Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network