Honeypots 2.0 - A New Twist on Defending Enterprise Networks
Offered By: Security BSides San Francisco via YouTube
Course Description
Overview
Explore the evolution of honeypots and dynamic deception techniques in enterprise network defense through this BSidesSF 2018 conference talk. Delve into the concept of "Honeypots 2.0" and learn how modern technologies like virtualization, cloud computing, containers, and DevOps tool chains enable scaling honeypots for greater impact in large-scale enterprise networks. Discover the potential of the Python-based Twisted networking framework for developing advanced honeypot technologies. Gain insights into honeypot essentials, scaling strategies, and the implementation of dynamic deception at scale. Examine practical examples, including Modbus and dynamic implementations, with less than 20 lines of code. Understand the relevance of these techniques in defending against insider threats and securing Industrial Internet of Things (IIoT) environments.
Syllabus
Introduction
Industrial Internet of Things
Digital Twin
Cyber Security
Dynamic Deception
Types of Deception
Signal Injection
What is a Honeypot
Goals of Honeypots
Insider Threat
Python Implementation
Output
Code Complexity
Twisted
Twisted Example
Lesson 19 Less Than 20 Lines of Code
Lesson 19 Dynamic Example
Modbus Example
Scaling
Conclusion
Taught by
Security BSides San Francisco
Related Courses
Cyberhacker Series: Honeypots, IDS and FW'sUdemy Curso de Introducción a la Seguridad Informática desde Cero!
Udemy Kali Linux Tutorial in Hindi
YouTube Data-Driven Network Security Essentials
LinkedIn Learning Ethical Hacking: Evading IDS, Firewalls, and Honeypots
LinkedIn Learning