YoVDO

Defending Critical Infrastructure: Deep Enumeration and Proprietary Protocol Analysis

Offered By: BSidesLV via YouTube

Tags

Cybersecurity Courses Network Security Courses Risk Management Courses Critical Infrastructure Courses Vulnerability Assessment Courses Defensive Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive methodology for deep enumeration and proprietary protocol analysis in this 41-minute conference talk from BSidesLV. Delve into the importance of understanding and dissecting proprietary protocols to enhance critical infrastructure security. Learn how this approach aligns with the 2023 National Cybersecurity Strategy's top priority. Discover a well-defined, repeatable methodology for product security testing that goes beyond basic vulnerability scans and red teaming. Witness a practical demonstration using an actual proprietary protocol, showcasing how threat actors can exploit it and how defenders can mitigate associated risks. Gain valuable insights into skills crucial for cyber security professionals to effectively protect critical infrastructure and businesses relying on these protocols.

Syllabus

Ground Truth, Tue, Aug 6, 12:30 - Tue, Aug 6, CDT


Taught by

BSidesLV

Related Courses

Security Principles
(ISC)² via Coursera
Emergency and Disaster Training and Exercising: An Introduction
Coventry University via FutureLearn
A General Approach to Risk Management
University System of Georgia via Coursera
A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera
Academia de auditoría en la nube: independencia en la nube (Español LATAM) | Cloud Audit Academy - Cloud Agnostic (Spanish from Latin America)
Amazon Web Services via AWS Skill Builder