Breaking NBAD & UEBA Detection
Offered By: YouTube
Course Description
Overview
Explore advanced techniques for circumventing Network Behavior Anomaly Detection (NBAD) and User and Entity Behavior Analytics (UEBA) in this informative conference talk from GrrCON 2019. Delve into the fundamentals of intrusion detection, anomaly detection, and security operations before examining sophisticated methods of data poisoning, exfiltration, and initial access. Learn about innovative approaches such as pump dump, Docker exploitation, and network bridging. Witness a live demonstration of nonrepudiation techniques, sampling, and TLS manipulation. Gain insights into REST API vulnerabilities, network scanning, and baseline manipulation to enhance your understanding of cybersecurity challenges and defenses.
Syllabus
Intro
What is intrusion detection
What is anomaly detection
What is NBAD
Security Operations
Data Poisoning
Data Exfiltration
Initial Access
Pump Dump
Docker
Pocket Dimension
Network Bridge
Spoofing
Syslog
Live Demo
Nonrepudiation
Samplingider
TLS
In Probe
REST API
Network Scan
Baseline Boiling
Recap
Related Courses
Model Building and ValidationAT&T via Udacity Поиск структуры в данных
Moscow Institute of Physics and Technology via Coursera Data Analytics Foundations for Accountancy II
University of Illinois at Urbana-Champaign via Coursera Developing Machine Learning Applications
Amazon via Independent Anomaly Detection in Time Series Data with Keras
Coursera Project Network via Coursera