YoVDO

Tracing Adversaries - Detecting Attacks with ETW

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses PowerShell Courses Threat Detection Courses

Course Description

Overview

Explore advanced techniques for detecting and tracing adversarial activities using Event Tracing for Windows (ETW) in this informative conference talk from Derbycon 7. Delve into practical demonstrations covering process and thread monitoring, PowerShell command tracking, script block capturing, domain lookup analysis, child process detection, file I/O monitoring, and thread tracking. Gain valuable insights into enhancing your cybersecurity defenses and improving your ability to identify and respond to potential threats in Windows environments.

Syllabus

Intro
Demo
Process Thread
PowerShell Commands
Capturing Script Blocks
Domain Lookup
Child Processes
File IO
Thread Tracking


Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network