Honeypots 2.0 - A New Twist on Defending Enterprise Networks
Offered By: Security BSides San Francisco via YouTube
Course Description
Overview
Explore the evolution of honeypots and dynamic deception techniques in enterprise network defense through this BSidesSF 2018 conference talk. Delve into the concept of "Honeypots 2.0" and learn how modern technologies like virtualization, cloud computing, containers, and DevOps tool chains enable scaling honeypots for greater impact in large-scale enterprise networks. Discover the potential of the Python-based Twisted networking framework for developing advanced honeypot technologies. Gain insights into honeypot essentials, scaling strategies, and the implementation of dynamic deception at scale. Examine practical examples, including Modbus and dynamic implementations, with less than 20 lines of code. Understand the relevance of these techniques in defending against insider threats and securing Industrial Internet of Things (IIoT) environments.
Syllabus
Introduction
Industrial Internet of Things
Digital Twin
Cyber Security
Dynamic Deception
Types of Deception
Signal Injection
What is a Honeypot
Goals of Honeypots
Insider Threat
Python Implementation
Output
Code Complexity
Twisted
Twisted Example
Lesson 19 Less Than 20 Lines of Code
Lesson 19 Dynamic Example
Modbus Example
Scaling
Conclusion
Taught by
Security BSides San Francisco
Related Courses
Design Computing: 3D Modeling in Rhinoceros with Python/RhinoscriptUniversity of Michigan via Coursera A Practical Introduction to Test-Driven Development
LearnQuest via Coursera FinTech for Finance and Business Leaders
ACCA via edX Access Bioinformatics Databases with Biopython
Coursera Project Network via Coursera Accounting Data Analytics
University of Illinois at Urbana-Champaign via Coursera