YoVDO

Automation Attacks at Scale - Detecting and Mitigating Distributed Threats

Offered By: Cooper via YouTube

Tags

Cybersecurity Courses Threat Detection Courses Credential Stuffing Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the growing threat of automation attacks in this 30-minute conference talk from Hack.lu 2017. Delve into how these attacks exploit stolen credentials, attack toolkits, and scalable infrastructure to launch widespread, hard-to-detect assaults across various industries. Learn about detection methodologies to counter these threats and examine three real-world examples of attackers creating and monetizing distributed infrastructure for launching such attacks. Gain insights from Will Glazier, Threat Intelligence Analyst & Architect at Stealth Security, and Mayank Dhiman, Principal Security Researcher, as they share their expertise on malicious automation, account takeover, and online fraud prevention.

Syllabus

Hack.lu 2017 Automation Attacks at Scale by Will Glazier and Mayank Dhiman


Taught by

Cooper

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network