YoVDO

Developing Trust and Gitting Betrayed

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Software Development Courses Cybersecurity Courses Risk Management Courses Unit Testing Courses

Course Description

Overview

Explore the critical role of trust in business and cybersecurity through this 48-minute Black Hat conference talk. Delve into the analysis and exploitation of trust relationships between code, platforms, developers, and organizations. Learn about the definition and root of trust, networking, exploitation techniques, and real-world examples. Discover how unit tests and command and control systems can be leveraged in attacks. Gain insights into initial foothold strategies, backdoor techniques, and mitigation measures. Enhance your understanding of trust-based vulnerabilities and their impact on organizational security.

Syllabus

Introduction
What is Trust
Trust Relationships
Trust Defined
Root of Trust
Networking
Exploitation
Examples
Unit Tests
Command and Control
Goals
Initial foothold
Setup Process
Where are we
Backdoor oneliner
Demo
Summary
Setup
Mitigation
Questions


Taught by

Black Hat

Related Courses

Ruby on Rails: An Introduction
Johns Hopkins University via Coursera
Internet of Things Capstone: Build a Mobile Surveillance System
University of California, San Diego via Coursera
Engineering Maintainable Android Apps
Vanderbilt University via Coursera
Orientação a Objetos com Java
Instituto Tecnológico de Aeronáutica via Coursera
TDD – Desenvolvimento de Software Guiado por Testes
Instituto Tecnológico de Aeronáutica via Coursera