Easy Indicators of Compromise - Creating a Deception Infrastructure
Offered By: YouTube
Course Description
Overview
Learn about creating effective deception infrastructure for cybersecurity in this 49-minute conference talk from NolaCon 2017. Explore various methods to detect attackers, implement good security practices, and build robust security programs. Discover the potential of machine learning and artificial intelligence in cybersecurity, and gain insights into next-generation tools for detection. Delve into topics such as PowerShell, cloud security, and the challenges of detection. Understand the concept of deception in cybersecurity, including fake information, port ranges, and admin accounts. Explore Kerberos SPN and other advanced techniques to enhance your organization's security posture.
Syllabus
Intro
Different ways to detect attackers
Good security practices
Protection detection
Internal Blue Pulsar
Building Security Programs
Machine Learning Artificial Intelligence
PowerShell
Next Generation Tools
Detection
Cloud
Ticket Not Power
Detection is Hard
Unicorn
Deception
Fake Information
Port Ranges
Scribbles
Llemon
Admin Accounts
Kerberos SPN
Questions
Related Courses
Windows PowerShell FundamentalsMicrosoft via edX Windows 10 Features for a Mobile Workforce: Managing and Maintaining Devices in the Enterprise
edX Deploying Your First Resources in Azure
Udemy Advanced Server 2016 Administration: Hands-on Training
Udemy Windows Server 2016 Administration
Udemy