YoVDO

Detecting Credential Abuse - Core Concepts and Challenges

Offered By: BSidesLV via YouTube

Tags

Cybersecurity Courses Access Control Courses Log Analysis Courses Intrusion Detection Courses Privilege Escalation Courses Lateral Movement Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive conference talk on detecting credential abuse presented at BSidesLV's PasswordsCon. Delve into the critical importance of credentials for attackers and the challenges defenders face in identifying unauthorized access. Learn about core detection concepts, including useful patterns, the Impossible Travel problem, and credential binding violations. Examine the value of logs in credential abuse detection and prevention strategies. Discuss trade-offs in security controls, challenges in identifying threats, and the importance of considering user experience when implementing security measures. Gain insights from speakers Troy Defty and Kathy Zhu on protecting systems from credential-based attacks and improving overall cybersecurity posture.

Syllabus

PasswordsCon, Tue, Aug 6, 16:00 - Tue, Aug 6, CDT


Taught by

BSidesLV

Related Courses

Cybersecurity and Its Ten Domains
University System of Georgia via Coursera
Bases de données relationnelles : Comprendre pour maîtriser
Inria (French Institute for Research in Computer Science and Automation) via France Université Numerique
Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera
Web Application Development: Security
University of New Mexico via Coursera
Computing, Storage and Security with Google Cloud Platform
Google via Coursera