YoVDO

I Simulate Therefore I Catch - Enhancing Detection Engineering with Adversary Simulation

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Threat Detection Courses Password Spraying Courses Adversary Simulation Courses

Course Description

Overview

Explore adversary simulation techniques to enhance detection engineering in this 50-minute conference talk from Derbycon 2019. Dive into building an attacker's playground, implementing prevention controls, and validating detection resilience. Learn about automated adversary simulation, password spraying, network share enumeration, and privilege escalation. Gain insights on measuring detection maturity and analyzing detection analytics to improve your blue team's capabilities.

Syllabus

Intro
FUN FACT ON PERU
BLUE TEAM IN 2019
BUILDING THE ATTACKER'S PLAYGROUND
DETECTION ENGINEERING
FIRST STEP: PREVENTION CONTROLS
VALIDATE DETECTION RESILIENCE
MEASURE DETECTION MATURITY
AUTOMATED ADVERSARY SIMULATION
PENTEST REPORT 2018
PASSWORD SPRAYING: T1110
NETWORK SPRAY: PICKING HOST TARGETS
DETECTION ANALYTICS
NETWORK SHARE (T1135) & PRIVILEGE ENUMERATION
CLOSINS SURVEY FOR THE BLUE TEAM


Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network