YoVDO

Learning from the Enemy - A Look Inside the Techniques of Ocean Lotus - APT32

Offered By: RSA Conference via YouTube

Tags

RSA Conference Courses Cybersecurity Courses Macros Courses

Course Description

Overview

Explore the tools and techniques employed by real-world threat actors like OceanLotus/APT32 in this 40-minute conference talk from the RSA Conference. Gain firsthand knowledge of cybercriminal operations, including macro attacks, Base64 encoding, and testing methods. Understand the critical importance of comprehending these threats for organizations and governments seeking to bolster their cyber defenses. Delve into a demonstration showcasing various aspects of cyberattacks, including macros, error dialogs, and encoding techniques. Enhance your cybersecurity awareness and defense strategies by learning directly from the enemy's playbook.

Syllabus

Introduction
Demonstration
Macros
Error Dialogs
Macro Attacks
Base64 Encoding
Testing


Taught by

RSA Conference

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network