I Simulate Therefore I Catch - Enhancing Detection Engineering with Adversary Simulation
Offered By: YouTube
Course Description
Overview
Explore adversary simulation techniques to enhance detection engineering in this 50-minute conference talk from Derbycon 2019. Dive into building an attacker's playground, implementing prevention controls, and validating detection resilience. Learn about automated adversary simulation, password spraying, network share enumeration, and privilege escalation. Gain insights on measuring detection maturity and analyzing detection analytics to improve your blue team's capabilities.
Syllabus
Intro
FUN FACT ON PERU
BLUE TEAM IN 2019
BUILDING THE ATTACKER'S PLAYGROUND
DETECTION ENGINEERING
FIRST STEP: PREVENTION CONTROLS
VALIDATE DETECTION RESILIENCE
MEASURE DETECTION MATURITY
AUTOMATED ADVERSARY SIMULATION
PENTEST REPORT 2018
PASSWORD SPRAYING: T1110
NETWORK SPRAY: PICKING HOST TARGETS
DETECTION ANALYTICS
NETWORK SHARE (T1135) & PRIVILEGE ENUMERATION
CLOSINS SURVEY FOR THE BLUE TEAM
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network