YoVDO

Detecting Credential Abuse - Core Concepts and Challenges

Offered By: BSidesLV via YouTube

Tags

Cybersecurity Courses Access Control Courses Log Analysis Courses Intrusion Detection Courses Privilege Escalation Courses Lateral Movement Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive conference talk on detecting credential abuse presented at BSidesLV's PasswordsCon. Delve into the critical importance of credentials for attackers and the challenges defenders face in identifying unauthorized access. Learn about core detection concepts, including useful patterns, the Impossible Travel problem, and credential binding violations. Examine the value of logs in credential abuse detection and prevention strategies. Discuss trade-offs in security controls, challenges in identifying threats, and the importance of considering user experience when implementing security measures. Gain insights from speakers Troy Defty and Kathy Zhu on protecting systems from credential-based attacks and improving overall cybersecurity posture.

Syllabus

PasswordsCon, Tue, Aug 6, 16:00 - Tue, Aug 6, CDT


Taught by

BSidesLV

Related Courses

CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent
Enterprise Security Fundamentals
Microsoft via edX
Penetration Testing - Post Exploitation
New York University (NYU) via edX
Ultimate Ethical Hacking and Penetration Testing (UEH)
Udemy
Hands-on Penetration Testing Labs 4.0
Udemy