YoVDO

Mining Disputed Territories - Studying Attacker Signatures

Offered By: Recon Conference via YouTube

Tags

REcon Conference Courses Cybersecurity Courses Situational Awareness Courses Threat Hunting Courses

Course Description

Overview

Explore proactive defense strategies and attacker dynamics in this 50-minute conference talk from REcon 2019. Delve into the world of cyber situational awareness, examining how both defenders and sophisticated malware families employ defensive measures. Learn how to leverage insights from attacker monitoring techniques to uncover previously unknown operations and actor dynamics. Discover methods for piggybacking on the situational awareness of organizations with unique vantage points, gleaned from shared victimology. Gain valuable knowledge on turning these insights into actionable defense strategies to better protect the entire internet ecosystem against common adversaries.

Syllabus

REcon 2019- Mining Disputed territories: Studying Attacker Signatures by Juan Andres Guerrero Saade


Taught by

Recon Conference

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network