Mining Disputed Territories - Studying Attacker Signatures
Offered By: Recon Conference via YouTube
Course Description
Overview
Explore proactive defense strategies and attacker dynamics in this 50-minute conference talk from REcon 2019. Delve into the world of cyber situational awareness, examining how both defenders and sophisticated malware families employ defensive measures. Learn how to leverage insights from attacker monitoring techniques to uncover previously unknown operations and actor dynamics. Discover methods for piggybacking on the situational awareness of organizations with unique vantage points, gleaned from shared victimology. Gain valuable knowledge on turning these insights into actionable defense strategies to better protect the entire internet ecosystem against common adversaries.
Syllabus
REcon 2019- Mining Disputed territories: Studying Attacker Signatures by Juan Andres Guerrero Saade
Taught by
Recon Conference
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network