Vulnerabilities in Application Whitelisting - Malware Case Studies
Offered By: YouTube
Course Description
Overview
Explore vulnerabilities in application whitelisting through malware case studies in this conference talk from BSidesLV 2013. Delve into Jared Sperl's analysis of real-world examples, uncovering weaknesses in whitelisting approaches and their exploitation by malicious actors. Gain insights into the limitations of application whitelisting as a security measure and learn about potential attack vectors that bypass these controls. Understand the implications for cybersecurity professionals and organizations relying on whitelisting techniques for protection against malware threats.
Syllabus
BSidesLV 2013 3 2 4 Vulnerabilities in Application Whitelisting Malware Case Studies Jared Sperl
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network