Open Secrets of the Defense Industry - Building Your Own Intelligence Program From the Ground
Offered By: YouTube
Course Description
Overview
Explore the intricacies of building an intelligence program from the ground up in this 51-minute conference talk from BSides Columbus 2016. Delve into topics such as advanced persistent threats, static variables, and class structure within the aerospace industry. Learn about intelligence gathering techniques, including open-source methods, data collection, and the importance of feedback loops. Discover the significance of intel sharing, targeting information, and defending data through best practices and protocols. Gain insights into effective intel sharing communities, automated remediation, and top security controls. Examine practical examples like fake login forms, Cuckoo Sandbox, and document tracking to enhance your understanding of offensive and defensive strategies in the cybersecurity landscape.
Syllabus
Introduction
Who am I
Overview
Means
Advanced Persistent
Static Variables
Class Structure
Aerospace Industry
Not a Rat
Fake Login Form
Intelligence
Feedback Loop
Data Collection
Goals
Why Open Source
People
Cuckoo Sandbox
Document
Tracking
Sharing
Declassified Report
Intel Sharing
Targeting Information
Reporting Watering Holes
Defending Data
Best Practices
Protocols
Crits
What makes a good Intel sharing community
No leverage
Automated remediation
Slides
Top Security Controls
Related Courses
Social Network AnalysisUniversity of Michigan via Coursera Intro to Algorithms
Udacity Data Analysis
Johns Hopkins University via Coursera Computing for Data Analysis
Johns Hopkins University via Coursera Health in Numbers: Quantitative Methods in Clinical & Public Health Research
Harvard University via edX