YoVDO

Detecting Credential Abuse - Core Concepts and Challenges

Offered By: BSidesLV via YouTube

Tags

Cybersecurity Courses Access Control Courses Log Analysis Courses Intrusion Detection Courses Privilege Escalation Courses Lateral Movement Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive conference talk on detecting credential abuse presented at BSidesLV's PasswordsCon. Delve into the critical importance of credentials for attackers and the challenges defenders face in identifying unauthorized access. Learn about core detection concepts, including useful patterns, the Impossible Travel problem, and credential binding violations. Examine the value of logs in credential abuse detection and prevention strategies. Discuss trade-offs in security controls, challenges in identifying threats, and the importance of considering user experience when implementing security measures. Gain insights from speakers Troy Defty and Kathy Zhu on protecting systems from credential-based attacks and improving overall cybersecurity posture.

Syllabus

PasswordsCon, Tue, Aug 6, 16:00 - Tue, Aug 6, CDT


Taught by

BSidesLV

Related Courses

Deploying Applications with Heroku
Udacity
User Research and Design
University of Minnesota via Coursera
Planning a Security Incident Response
Microsoft via edX
Kubernetes Hands-On - Deploy Microservices to the AWS Cloud
Udemy
Contact Center AI: Building a Dynamic Virtual Agent
Pluralsight