YoVDO

Hackers, Hooligans, Heists, & History

Offered By: NDC Conferences via YouTube

Tags

NDC Conferences Courses Cybersecurity Courses Malware Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the fascinating world of cybersecurity through a comprehensive presentation based on over two decades of experience across 50+ countries. Delve into real-life histories and use cases of hackers, hooligans, and heists, tracing the evolution from mechanical computers to the Internet. Examine how acts of sabotage, fraud, and theft have been conducted with low risk and high reward, sometimes even with safe harbor from prosecution. Analyze the motivations of various bad actors, including insiders, hacktivists, cybercriminals, and nation-states, driven by money, politics, revenge, and ideology. Gain insights into the "who, how, and why" of cyberattacks, identifying both traditional and modern threat vectors organized by motives such as sabotage and espionage. Learn from detailed explorations of each threat actor type, supported by real-life use cases and personal accounts. Understand the industry's response to these threats and why traditional approaches are no longer effective. Discover new approaches to cybersecurity that focus on actual security effectiveness rather than the latest buzzwords or regulatory mandates. Reflect on the current state of cybersecurity investments and their lack of measurable results. Consider how organizations can better prioritize their security efforts, identify effective tools, and make informed decisions about resource allocation. Ultimately, gain valuable insights into improving cybersecurity practices and leaving past mistakes in the history books.

Syllabus

Intro
Background
Raise of Hands
The Worlds First Computer
Radio 1895
Mobile Phones
Joy Bubbles 2600 Hertz
Malware
Reddit Joke
Gary Ming
Jerome Crevel
Ten Days of Rain
North Korea
North Korea Attacks
Cyber Equalizer
German Tanks
AK47s
Smart Dust
Brazil
Petrobras
American Superconductor
Chinese Hacker
John Dillinger
The Cloud
Environmental Drift
Medieval History
Security Effectiveness Report
Bank Robbers


Taught by

NDC Conferences

Related Courses

Health Informatics: Data and Interoperability Standards
Georgia Institute of Technology via edX
Fractal Architecture
NDC Conferences via YouTube
Strangling the Monolith - Applied Patterns & Practices from the Trenches
NDC Conferences via YouTube
Refactoring Is Not Just Clickbait
NDC Conferences via YouTube
Amazing Algorithms for Solving Problems in Software
NDC Conferences via YouTube