YoVDO

Breaching the Depths of the Abyss: Exposing Rootkits - Track 2, Session 4

Offered By: HackMiami via YouTube

Tags

Rootkits Courses Cybersecurity Courses Digital Forensics Courses Malware Courses Threat Detection Courses System Security Courses Advanced Persistent Threats Courses Kernel Exploitation Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Dive into the depths of rootkit technology and defense strategies in this 39-minute conference talk from HackMiami. Explore the inner workings of rootkits, advanced malware that embeds deep within compromised systems, and learn techniques for their detection and removal. Examine kernel exploitation tactics used by rootkits to maintain stealth and evade security controls. Discover how the Living Off The Land Drivers (LOLDRIVERS.IO) project can be utilized as a powerful tool for identifying and neutralizing these elusive threats. Gain insights into emerging trends in rootkit technology and understand the importance of proactive cybersecurity measures to protect both personal and enterprise-level systems. Equip yourself with essential knowledge to defend against these stealthy adversaries lurking in the digital realm.

Syllabus

Track 2 04 Breaching the Depths of the Abyss - Jose Hernandez - Michael Haag


Taught by

HackMiami

Related Courses

Foundations of Computer Science for Teachers
The University of Texas at Austin via edX
Computer Forensics
Rochester Institute of Technology via edX
FinTech Security and Regulation (RegTech)
The Hong Kong University of Science and Technology via Coursera
Cyber Security
CEC via Swayam
Fundamentos de Ciberseguridad: un enfoque práctico
Inter-American Development Bank via edX