Honeypots for Active Defense - A Practical Guide to Deploying Honeynets Within the Enterprise
Offered By: YouTube
Course Description
Overview
Syllabus
Intro
Traditional Defensive Concepts
InfoSec Realities
Why Internal Honeypots?
Honeypot Use Cases
Types of Honeypots
Windows Powershell Honeyports
Artillery Logging Bonus! File Integrity Monitoring
Learning from Attackers
Web Labyrinth
Fake PhpMyAdmin
$any fake login panel
Honeybadger
Emulate various services and capture verbose data on attacks
Analysis Tools • Log Rhythm Network Monitor and SIEM
Routers and Switches
High Interaction – Warning!
Document Bugging
More Tricks
Monitoring • Dedicated SOC - Security Operations Center
Enterprise Threat Intelligence
Event Correlation
Honeypot Dashboards • Honey Drive3 comes complete with dashboards and enhancement scripts to display interesting data.
Closing Thoughts
Works Cited & Recommended Reading • Strand, John, and Asadoorian, Paul Offensive Countermeasures: The Art of Active Defense 2013
Related Courses
An Introduction to Computer NetworksStanford University via Independent Computer Networks
University of Washington via Coursera Computer Networking
Georgia Institute of Technology via Udacity Cybersecurity and Its Ten Domains
University System of Georgia via Coursera Model Building and Validation
AT&T via Udacity