YoVDO

Anatomy of an APT Attack

Offered By: Hack In The Box Security Conference via YouTube

Tags

Hack In The Box Security Conference Courses Cybersecurity Courses Governance Courses Cybercrime Courses Advanced Persistent Threats Courses Data Exfiltration Courses

Course Description

Overview

Explore the anatomy of Advanced Persistent Threat (APT) attacks in this 27-minute conference talk from the Hack In The Box Security Conference. Delve into the tactics employed by state-sponsored hackers, organized crime groups, and intelligence services. Trace the evolution of industrial espionage, from historical examples to its current impact across industries. Examine a real-world APT attack scenario, detailing the compromise and remediation process of a large multinational company. Learn about the global economic impact of cybercrime, the stages of an APT attack, and the complex remediation timeline. Gain insights into incident response governance and the challenges of securing integrated supply chains.

Syllabus

Introduction
Background
Piracy
Ecosystem
Supply Chain
DNS Exfiltration
Remediation


Taught by

Hack In The Box Security Conference

Related Courses

Security Principles
(ISC)² via Coursera
A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera
FinTech for Finance and Business Leaders
ACCA via edX
Access Control Concepts
(ISC)² via Coursera
Access Controls
(ISC)² via Coursera