YoVDO

Honeypots 2.0 - A New Twist on Defending Enterprise Networks

Offered By: Security BSides San Francisco via YouTube

Tags

Security BSides Courses Cybersecurity Courses Python Courses Honeypots Courses Insider Threats Courses

Course Description

Overview

Explore the evolution of honeypots and dynamic deception techniques in enterprise network defense through this BSidesSF 2018 conference talk. Delve into the concept of "Honeypots 2.0" and learn how modern technologies like virtualization, cloud computing, containers, and DevOps tool chains enable scaling honeypots for greater impact in large-scale enterprise networks. Discover the potential of the Python-based Twisted networking framework for developing advanced honeypot technologies. Gain insights into honeypot essentials, scaling strategies, and the implementation of dynamic deception at scale. Examine practical examples, including Modbus and dynamic implementations, with less than 20 lines of code. Understand the relevance of these techniques in defending against insider threats and securing Industrial Internet of Things (IIoT) environments.

Syllabus

Introduction
Industrial Internet of Things
Digital Twin
Cyber Security
Dynamic Deception
Types of Deception
Signal Injection
What is a Honeypot
Goals of Honeypots
Insider Threat
Python Implementation
Output
Code Complexity
Twisted
Twisted Example
Lesson 19 Less Than 20 Lines of Code
Lesson 19 Dynamic Example
Modbus Example
Scaling
Conclusion


Taught by

Security BSides San Francisco

Related Courses

Early Detection through Deception
YouTube
Hack for Show, Report for Dough - Brian King
YouTube
Blue Teamin on a Budget of Zero - Kyle Bubp
YouTube
Windows Event Logs - Zero to Hero
YouTube
Weaponizing Splunk - Using Blue Team Tools for Evil
YouTube