Game On Using Red Team to Rapidly Evolve Your Defenses
Offered By: YouTube
Course Description
Overview
Explore the world of cybersecurity through this 54-minute conference talk from Derbycon 7 (2017). Dive into the experiences of Joff Thyer and Pete Petersen as they discuss their journey into cybersecurity, the importance of building trust networks, and their collaborative engagement at Black Hills. Gain insights into advanced techniques such as threat hunting and red teaming, and understand their perspectives on major challenges in the field. Learn valuable lessons from their experiences and discover how to use red team tactics to rapidly improve your defensive strategies.
Syllabus
Intro
How did you get into cybersecurity
How do you develop the circle of trust
Black Hills engagement with Pete Petersen
Second CT pivot
Threat hunting
Red teaming
Petes thoughts
The big problem
Lessons learned
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network