Exploiting the Zeroth Hour - Developing Your Advanced Persistent Threat to Pwn the N
Offered By: YouTube
Course Description
Overview
Explore advanced persistent threat (APT) development techniques in this 54-minute conference talk from DerbyCon 3.0. Delve into strategies for exploiting zero-day vulnerabilities and learn how to create sophisticated APTs to penetrate network defenses. Gain insights into the mindset and methodologies of advanced attackers, and understand the critical steps in developing a highly effective persistent threat. Enhance your cybersecurity knowledge by examining real-world examples and practical applications of APT exploitation techniques.
Syllabus
DerbyCon 3 0 1304 Exploiting The Zeroth Hour Developing Your Advanced Persistent Threat To Pwn The N
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Proactive Computer Security
University of Colorado System via Coursera Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Hacker101
HackerOne via Independent CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent