YoVDO

Knowing the Enemy - Creating a Cyber Threat Actor Attribution Program

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Digital Forensics Courses Social Engineering Courses Threat Intelligence Courses Spear Phishing Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn to develop a comprehensive cyber threat actor attribution program in this 22-minute conference talk from BSides Philly 2016. Explore topics including Morse Code, Sun Tzu's strategies, spear phishing, business email compromise, social engineering, and data monitoring. Discover techniques for identifying attacker behaviors, habits, and forensic evidence. Gain insights into investigative tools, data extraction methods, and the importance of analyzing common strings. Understand the challenges of collecting too much information and how to effectively attribute cyber attacks to specific threat actors.

Syllabus

Introduction
Morse Code
Sun Tzu
Program
Customers want more
spear phishing
business email compromise
make it work
this is getting to
social engineering
whats a fish
stats
numbers
monitoring
data sources
attribute attribution
poker tells
behaviors and habits
human limitations
resources
attack habits
attribution
forensic evidence
collecting too much
extracting the files
common strings
spreadsheet
mount ego
investigative tools
hacker dread


Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube