Easy Indicators of Compromise - Creating a Deception Infrastructure
Offered By: YouTube
Course Description
Overview
Learn about creating effective deception infrastructure for cybersecurity in this 49-minute conference talk from NolaCon 2017. Explore various methods to detect attackers, implement good security practices, and build robust security programs. Discover the potential of machine learning and artificial intelligence in cybersecurity, and gain insights into next-generation tools for detection. Delve into topics such as PowerShell, cloud security, and the challenges of detection. Understand the concept of deception in cybersecurity, including fake information, port ranges, and admin accounts. Explore Kerberos SPN and other advanced techniques to enhance your organization's security posture.
Syllabus
Intro
Different ways to detect attackers
Good security practices
Protection detection
Internal Blue Pulsar
Building Security Programs
Machine Learning Artificial Intelligence
PowerShell
Next Generation Tools
Detection
Cloud
Ticket Not Power
Detection is Hard
Unicorn
Deception
Fake Information
Port Ranges
Scribbles
Llemon
Admin Accounts
Kerberos SPN
Questions
Related Courses
Architecting Microsoft Azure SolutionsMicrosoft via edX Internetwork Security
Indian Institute of Technology, Kharagpur via Swayam Network Security
Georgia Institute of Technology via Udacity Microsoft Professional Orientation : Cloud Administration
Microsoft via edX Cyber Threats and Attack Vectors
University of Colorado System via Coursera