YoVDO

Next Generation Red Teaming - Integrating Application-Centric Attacks

Offered By: OWASP Foundation via YouTube

Tags

Cybersecurity Courses Penetration Testing Courses Application Security Courses Threat Modeling Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the evolution of red teaming in cybersecurity through this 46-minute OWASP Foundation conference talk. Delve into the limitations of traditional assessment methods and discover how to integrate application-specific attack surfaces into more effective red team efforts. Learn about composite, cross-domain attack vectors and their potential to identify organizational risks more comprehensively. Gain insights from real-world examples demonstrating the power of application-centric composite attacks in modern red teaming approaches. Understand key elements of successful red team setups, including threat modeling, business risk analysis, and the importance of considering the software attack surface. Examine the scalability of these advanced techniques and their significance in today's cybersecurity landscape.

Syllabus

Intro
Agenda
What Is Red Teaming?
Basic Elements Of A Red Team
Electronic
Social
Physical
Other Activities
Traditional Assessment Process
Why Is This Flawed?
Point In Time Risk Reliance Scenario
Setting Up A Successful Red Team
Threat Modeling And Threat Analysis
Business Goals And Risks
The Software Attack Surface
High Risk Of Low Risk Applications
Composite Attack Scenario
Why Bother?
Scalability


Taught by

OWASP Foundation

Related Courses

MongoDB for .NET Developers
MongoDB University
Web Application Development – Capstone Course
University of New Mexico via Coursera
Ciberseguridad: ataques y contramedidas
Universidad Rey Juan Carlos via Independent
Reliable Cloud Infrastructure: Design and Process auf Deutsch
Google Cloud via Coursera
Securing and Integrating Components of your Application 日本語版
Google Cloud via Coursera