YoVDO

Easy Indicators of Compromise - Creating a Deception Infrastructure

Offered By: YouTube

Tags

Conference Talks Courses Artificial Intelligence Courses Cybersecurity Courses Machine Learning Courses PowerShell Courses Cloud Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn about creating effective deception infrastructure for cybersecurity in this 49-minute conference talk from NolaCon 2017. Explore various methods to detect attackers, implement good security practices, and build robust security programs. Discover the potential of machine learning and artificial intelligence in cybersecurity, and gain insights into next-generation tools for detection. Delve into topics such as PowerShell, cloud security, and the challenges of detection. Understand the concept of deception in cybersecurity, including fake information, port ranges, and admin accounts. Explore Kerberos SPN and other advanced techniques to enhance your organization's security posture.

Syllabus

Intro
Different ways to detect attackers
Good security practices
Protection detection
Internal Blue Pulsar
Building Security Programs
Machine Learning Artificial Intelligence
PowerShell
Next Generation Tools
Detection
Cloud
Ticket Not Power
Detection is Hard
Unicorn
Deception
Fake Information
Port Ranges
Scribbles
Llemon
Admin Accounts
Kerberos SPN
Questions


Related Courses

Architecting Microsoft Azure Solutions
Microsoft via edX
Internetwork Security
Indian Institute of Technology, Kharagpur via Swayam
Network Security
Georgia Institute of Technology via Udacity
Microsoft Professional Orientation : Cloud Administration
Microsoft via edX
Cyber Threats and Attack Vectors
University of Colorado System via Coursera