YoVDO

Open Secrets of the Defense Industry - Building Your Own Intelligence Program From the Ground

Offered By: YouTube

Tags

Conference Talks Courses Data Analysis Courses Cybersecurity Courses Data Collection Courses Advanced Persistent Threats Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of building an intelligence program from the ground up in this 51-minute conference talk from BSides Columbus 2016. Delve into topics such as advanced persistent threats, static variables, and class structure within the aerospace industry. Learn about intelligence gathering techniques, including open-source methods, data collection, and the importance of feedback loops. Discover the significance of intel sharing, targeting information, and defending data through best practices and protocols. Gain insights into effective intel sharing communities, automated remediation, and top security controls. Examine practical examples like fake login forms, Cuckoo Sandbox, and document tracking to enhance your understanding of offensive and defensive strategies in the cybersecurity landscape.

Syllabus

Introduction
Who am I
Overview
Means
Advanced Persistent
Static Variables
Class Structure
Aerospace Industry
Not a Rat
Fake Login Form
Intelligence
Feedback Loop
Data Collection
Goals
Why Open Source
People
Cuckoo Sandbox
Document
Tracking
Sharing
Declassified Report
Intel Sharing
Targeting Information
Reporting Watering Holes
Defending Data
Best Practices
Protocols
Crits
What makes a good Intel sharing community
No leverage
Automated remediation
Slides
Top Security Controls


Related Courses

Social Network Analysis
University of Michigan via Coursera
Intro to Algorithms
Udacity
Data Analysis
Johns Hopkins University via Coursera
Computing for Data Analysis
Johns Hopkins University via Coursera
Health in Numbers: Quantitative Methods in Clinical & Public Health Research
Harvard University via edX