Monitoring Solutions - Attacking IT Infrastructure at Its Core
Offered By: WEareTROOPERS via YouTube
Course Description
Overview
Explore a critical IT security talk delivered by Stefan Schiller at the TROOPERS23 conference in Heidelberg, Germany. Delve into the vulnerabilities of monitoring solutions and their potential impact on IT infrastructure. Gain insights into how these essential tools can become targets for attackers, compromising the very systems they are designed to protect. Learn about the latest attack vectors, defense strategies, and best practices for securing monitoring solutions. Understand the importance of robust security measures for these critical components of IT infrastructure. Benefit from the expertise shared at this renowned IT security event, hosted by ERNW_ITSec. Access additional resources and impressions from the conference through provided social media links and the official TROOPERS website.
Syllabus
TROOPERS23: Monitoring Solutions: Attacking IT Infrastructure at its Core
Taught by
WEareTROOPERS
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network