YoVDO

I'm a Hunter! Cyber Intelligence in the New-ish Frontier

Offered By: BSidesLV via YouTube

Tags

Security BSides Courses Reverse Engineering Courses Malware Analysis Courses

Course Description

Overview

Explore cyber intelligence techniques and strategies in this 21-minute conference talk from BSidesLV 2019. Delve into topics such as point of origin analysis, macro exploitation, intrusion attempts, and North Korean OPSEC failures. Gain insights into the roles of common hunters, their understanding of enemy weaknesses, and essential skills like malware analysis, reverse engineering, and adopting a hacker mindset. Discover valuable tools and venture into the dark web while learning how to continuously improve your cyber hunting capabilities.

Syllabus

Intro
POINT OF ORIGIN
EXAMPLES
FUN TIMES WITH MACROS
INTRUSION ATTEMPT
NORTH KOREA: OPSEC FAIL 101
COMMON HUNTERS AND THEIR ROLES
HUNTERS KNOW THEIR ENEMY'S WEAKNESSES
SKILLS: MALWARE ANALYSIS
SKILLS: REVERSE ENGINEERING
SKILLS: HACKER MINDSET
TOOLS
INTO THE DARK
LEARN AND GROW


Taught by

BSidesLV

Related Courses

Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Palo Alto Networks Cybersecurity Essentials II
Palo Alto Networks via Coursera
Introducción al Análisis del Malware en Windows
National Technological University – Buenos Aires Regional Faculty via Miríadax
Android Malware Analysis - From Zero to Hero
Udemy
How to Create and Embed Malware (2-in-1 Course)
Udemy