YoVDO

Easy Indicators of Compromise - Creating a Deception Infrastructure

Offered By: YouTube

Tags

Conference Talks Courses Artificial Intelligence Courses Cybersecurity Courses Machine Learning Courses PowerShell Courses Cloud Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn about creating effective deception infrastructure for cybersecurity in this 49-minute conference talk from NolaCon 2017. Explore various methods to detect attackers, implement good security practices, and build robust security programs. Discover the potential of machine learning and artificial intelligence in cybersecurity, and gain insights into next-generation tools for detection. Delve into topics such as PowerShell, cloud security, and the challenges of detection. Understand the concept of deception in cybersecurity, including fake information, port ranges, and admin accounts. Explore Kerberos SPN and other advanced techniques to enhance your organization's security posture.

Syllabus

Intro
Different ways to detect attackers
Good security practices
Protection detection
Internal Blue Pulsar
Building Security Programs
Machine Learning Artificial Intelligence
PowerShell
Next Generation Tools
Detection
Cloud
Ticket Not Power
Detection is Hard
Unicorn
Deception
Fake Information
Port Ranges
Scribbles
Llemon
Admin Accounts
Kerberos SPN
Questions


Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network