YoVDO

Automation Attacks at Scale - Detecting and Mitigating Distributed Threats

Offered By: Cooper via YouTube

Tags

Cybersecurity Courses Threat Detection Courses Credential Stuffing Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the growing threat of automation attacks in this 30-minute conference talk from Hack.lu 2017. Delve into how these attacks exploit stolen credentials, attack toolkits, and scalable infrastructure to launch widespread, hard-to-detect assaults across various industries. Learn about detection methodologies to counter these threats and examine three real-world examples of attackers creating and monetizing distributed infrastructure for launching such attacks. Gain insights from Will Glazier, Threat Intelligence Analyst & Architect at Stealth Security, and Mayank Dhiman, Principal Security Researcher, as they share their expertise on malicious automation, account takeover, and online fraud prevention.

Syllabus

Hack.lu 2017 Automation Attacks at Scale by Will Glazier and Mayank Dhiman


Taught by

Cooper

Related Courses

Web App Testing - Enumeration
Cyber Mentor via YouTube
Full Ethical Hacking Course - Beginner Network Penetration Testing
Cyber Mentor via YouTube
Zero to Hero Pentesting - Exploitation, Shells, and Some Credential Stuffing
Cyber Mentor via YouTube
Top Active Directory Attacks - Understand, then Prevent and Detect
RSA Conference via YouTube
Protecting Accounts from Credential Stuffing with Password Breach Alerting
USENIX via YouTube