YoVDO

Automation Attacks at Scale - Detecting and Mitigating Distributed Threats

Offered By: Cooper via YouTube

Tags

Cybersecurity Courses Threat Detection Courses Credential Stuffing Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the growing threat of automation attacks in this 30-minute conference talk from Hack.lu 2017. Delve into how these attacks exploit stolen credentials, attack toolkits, and scalable infrastructure to launch widespread, hard-to-detect assaults across various industries. Learn about detection methodologies to counter these threats and examine three real-world examples of attackers creating and monetizing distributed infrastructure for launching such attacks. Gain insights from Will Glazier, Threat Intelligence Analyst & Architect at Stealth Security, and Mayank Dhiman, Principal Security Researcher, as they share their expertise on malicious automation, account takeover, and online fraud prevention.

Syllabus

Hack.lu 2017 Automation Attacks at Scale by Will Glazier and Mayank Dhiman


Taught by

Cooper

Related Courses

Security Principles
(ISC)² via Coursera
A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera
FinTech for Finance and Business Leaders
ACCA via edX
Access Control Concepts
(ISC)² via Coursera
Access Controls
(ISC)² via Coursera