YoVDO

Much Ado About Credential Stuffing - CarolinaCon 2019 Preview

Offered By: Cyber Mentor via YouTube

Tags

Credential Stuffing Courses Cybersecurity Courses Social Engineering Courses Data Breaches Courses Password Security Courses

Course Description

Overview

Explore the world of credential stuffing in this 25-minute conference talk preview for CarolinaCon 2019. Delve into the concept of credential stuffing, its impact on cybersecurity, and real-world examples that highlight its prevalence. Learn about the common themes in credential stuffing attacks and discover effective prevention strategies. Gain valuable insights for both red teamers and cybersecurity professionals looking to enhance their understanding of this critical security issue.

Syllabus

Introduction
Red Teamers
What is credential stuffing
Story time
Calling the IT manager
Calling the internal access
The common theme
Prevention


Taught by

The Cyber Mentor

Related Courses

Cloud Data Security
University of Minnesota via Coursera
Incident Response and Recovery
(ISC)² via Coursera
Cyber Threats and Attack Vectors
University of Colorado System via Coursera
Киберугрозы и векторы атаки
University of Colorado System via Coursera
Cybersecurity in Healthcare (Hospitals & Care Centres)
Erasmus University Rotterdam via Coursera