YoVDO

The Use of Covert Communications in Modern Cyber Attacks

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Encryption Courses Network Traffic Analysis Courses Covert Communication Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of covert communications in modern cyber attacks through this 40-minute conference talk from Louisville InfoSec 2016. Delve into the various phases of cyber attacks, examining the tactics employed by sophisticated threat actors. Learn about behavior patterns, encryption methods, and the challenges of decrypting network traffic. Discover how attackers use innovative techniques like "hip messages" and unconventional protocols to evade detection. Analyze real-world use cases, including the identification of malicious behavior and the extraction of attacker instructions. Investigate the risks posed by remote access tools, malware like GlassRat, and non-human devices. Gain valuable insights into common techniques used by cybercriminals and develop a deeper understanding of the evolving landscape of cyber threats.

Syllabus

Introduction
Phases of a cyber attack
The smart guys
Behavior
Encryption
Do you decrypt network traffic
Behavior patterns
Hip messages
Demo
HTTP
Survey Report
Zombie Guts
Use Cases
Identifying Behavior
Pulling Instructions
What poses the greatest risk
Game of Thrones
Remote Access
GlassRat
Breaking Bad
Common Techniques
NonHuman Devices
Summary


Related Courses

Internet History, Technology, and Security
University of Michigan via Coursera
Sicherheit im Internet
openHPI
أساسيات التشفير
Rwaq (رواق)
Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera
Web Application Development: Security
University of New Mexico via Coursera