Phishing Past Mail Protection Controls Using Azure Information Protection
Offered By: YouTube
Course Description
Overview
Explore phishing techniques that bypass mail protection controls using Azure Information Protection (AIP) in this 30-minute conference talk from Derbycon 2019. Learn about AIP's features, including windows, file sizes, types, licensing, costs, and tracking capabilities. Discover how to implement document classification, encryption, and revocation. Watch live demonstrations of sending and opening encrypted documents, utilizing tracking features, and uploading documents. Examine the tracking timeline and results. Compare AIP with competitors, and understand email-specific features like padlock integration and Rights Management Services (RMS) configuration.
Syllabus
Intro
Credentials
Bio
What is AIP
AIP windows
File size
File types
Licensing and costs
Tracking
Cost
Features
Detection
Transport Rule
Document Revocation
Demos
Demo
Classification
Sending an encrypted document
Opening an encrypted document
Tracking feature
Tracking demo
Tracking timeline
Uploading a document
Checking the results
Competitors
Email
Email padlock
Configure RMS
Related Courses
Hands-on Text Mining and AnalyticsYonsei University via Coursera NLP and Text mining with python(for absolute beginners only)
Udemy BLIE-227 Document Processing Practice
Swayam InteligĂȘncia Artificial: Buscas em Textos com Python
Udemy Evaluate LayoutLMv3 for Document Classification - Save & Load Model to HuggingFace Hub
Venelin Valkov via YouTube