Sedating the Watchdog - Abusing Security Products to Bypass Windows Protections
Offered By: YouTube
Course Description
Overview
Explore techniques for bypassing Windows protections by exploiting vulnerabilities in security products in this conference talk from BSides San Francisco 2016. Delve into the methods used to identify and exploit weaknesses in watchdog systems, gaining insights into potential security risks and mitigation strategies. Learn how attackers can potentially abuse security software to compromise Windows systems, and understand the implications for both defenders and security product developers.
Syllabus
BSidesSF 109 Sedating the Watchdog Abusing Security Products to Bypass Windows Protections Tomer Bit
Related Courses
Building Geospatial Apps on Postgres, PostGIS, & Citus at Large ScaleMicrosoft via YouTube Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube What's New in Grails 2.0
ChariotSolutions via YouTube Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube