YoVDO

The Fox is in the Henhouse - Detecting a Breach Before the Damage is Done

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Malware Analysis Courses Incident Response Courses Threat Detection Courses Data Exfiltration Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn to detect and respond to security breaches before significant damage occurs in this 50-minute conference talk from HouSecCon 6 (2015). Explore the importance of visibility in cybersecurity, discover effective tools for breach detection, and understand the concept of symbiotic security. Delve into topics such as flow data analysis, pattern query language, and malware domain lists. Examine real-world examples of data exfiltration, port scans, and outbound connections. Gain insights into handling false positives, leveraging collective intelligence frameworks, and implementing real-time decision-making processes. Acquire practical knowledge on taking action and utilizing security analytics to enhance your organization's cybersecurity posture.

Syllabus

Intro
The problem
Visibility
The Solution
Choosing Your Tools
Tools
Tools can be greedy
Symbiotic security
The question
Flow Data
HD Moore
Pattern Query Language
Malware Domain List
Results
Symbiotic Example
Darknet Analytics
Data Exfiltration
Port Scans
Outbound Connections
False Positives
Poll
Walter
VirusTotal
McAfee Alerts
McAfee Timeline
Custom Integration
Collective Intelligence Framework
RealTime Decision Making
Taking Action
Security Analytics
LastCon
Questions


Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube