YoVDO

Spy vs Spy - Tips from the Trenches for Red and Blue Teams

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Social Engineering Courses Phishing Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore offensive and defensive cybersecurity strategies in this 28-minute conference talk from Derbycon 7 (2017). Delve into various attack and defense techniques, including phishing, social engineering, malicious devices, and password security. Learn about basic, better, and best practices for both red and blue teams, covering topics such as crafting effective phishing campaigns, implementing robust defenses, and utilizing advanced detection methods. Gain valuable insights into the ongoing battle between attackers and defenders, with practical tips for improving both offensive and defensive capabilities in the realm of cybersecurity.

Syllabus

Intro
BASIC ATTACK Phishing Social Engineering Technique
SPY BASIC DEFENSE SPY Phishing
SPY SETTER DEFENSE SPY Phishing
BETTER ATTACK Phishing Send a meeting invite instead of a message
BEST ATTACK Phishing
SPY DETECTION TECHNIQUES SPY Phishing
BASIC ATTACK Malicious Devices
BETTER ATTACK Malicious Devices
BEST ATTACK Malicious Devices
BASIC ATTACK Passwords
SPY BASIC DEFENSE SPY Passwords
BETTER ATTACK & DEFENSE Passwords
BEST ATTACK Passwords
SPY DETECTION TECHNIQUES SPY Authentication Netlogon


Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube