YoVDO

Phishing Past Mail Protection Controls Using Azure Information Protection

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Encryption Courses Document Classification Courses

Course Description

Overview

Explore phishing techniques that bypass mail protection controls using Azure Information Protection (AIP) in this 30-minute conference talk from Derbycon 2019. Learn about AIP's features, including windows, file sizes, types, licensing, costs, and tracking capabilities. Discover how to implement document classification, encryption, and revocation. Watch live demonstrations of sending and opening encrypted documents, utilizing tracking features, and uploading documents. Examine the tracking timeline and results. Compare AIP with competitors, and understand email-specific features like padlock integration and Rights Management Services (RMS) configuration.

Syllabus

Intro
Credentials
Bio
What is AIP
AIP windows
File size
File types
Licensing and costs
Tracking
Cost
Features
Detection
Transport Rule
Document Revocation
Demos
Demo
Classification
Sending an encrypted document
Opening an encrypted document
Tracking feature
Tracking demo
Tracking timeline
Uploading a document
Checking the results
Competitors
Email
Email padlock
Configure RMS


Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network