Ever Present Persistence - Established Footholds Seen in the Wild
Offered By: YouTube
Course Description
Overview
Explore real-world examples of persistent footholds established by attackers in this 56-minute conference talk from BSides Nashville 2016. Gain insights into the tactics, techniques, and procedures used by threat actors to maintain long-term access to compromised systems. Learn about various persistence mechanisms observed in actual incidents and understand how to detect and mitigate these advanced threats. Presenters Evan Pena and Chris Truncer share their expertise on identifying and countering sophisticated persistence methods employed by malicious actors in the wild.
Syllabus
R01 Ever Present Persistence Established Footholds Seen in the Wild Evan Pena Chris Truncer
Related Courses
Windows Server 2016 Security FeaturesMicrosoft via edX Detecting and Mitigating Cyber Threats and Attacks
University of Colorado System via Coursera Threat Detection: Planning for a Secure Enterprise
Microsoft via edX Microsoft Professional Capstone : Cybersecurity
Microsoft via edX Cyber Security Operations (Cisco CCNA)
The Open University via FutureLearn