The Infosec Crossroads
Offered By: Cooper via YouTube
Course Description
Overview
Syllabus
Intro
The Thought Process
The Attacks Evolve
Targets Have Shifted
Motivation
DDOS
Breaches
Perimeter
Hacks Happen
Browser Exploit
Nakatomi Space
Black Hat 2003
Exploits
Bug bounties
The problem with bug bounties
Dont play this game
How users behave
Advanced technology
User safety
User choice
Reactive approach
Compliance
The Golden Truth
Infosec Defense
Machine Learning
Stop 99 of malware
One percent of malware
We have to change
Intelligence
Proactive Security Testing
Collect everything
Our customers
Historical data
Moores law
The value of historical data
Battle of Two Narratives
Red Team
Who are you scared of
User ratings
User hardening efforts
Metrics
Shift the curve
Booby traps
Analysis decides actions
Block diagrams
Tracking
Blueprint
Buying from the top
Compliance and audits
Creativity
Business Value
Taught by
Cooper
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network