You See Honey, I See Beehive - Developing Honey Networks
Offered By: RSA Conference via YouTube
Course Description
Overview
Explore advanced cyber-defense strategies in this 30-minute RSA Conference talk by Joseph Muniz, Security Architect and Researcher at Cisco. Dive into the concept of honey networks, combining honeypots, security sensors, and continuous monitoring techniques for comprehensive breach defense. Learn about open-source and enterprise options suitable for networks of all sizes. Discover how to implement phantom network zones, design subnets for threat detection, create honeypot personas, and effectively tune your SIEM. Gain insights into unsampled NetFlow for enhanced visibility and understand the potential pitfalls of honeypot reconnaissance. Master the art of integrating multiple defense techniques to create a robust, end-to-end honey network that meets industry guidelines for cyber-defense capabilities.
Syllabus
Intro
Cat And Mouse Game
Basic Attack Conept
Endpoint and Branch Network
Security Capabilities
NetFlow = Visibility
Why Unsampled NetFlow?
Phantom Network Zones Concept
Phantom Network Alarm Examples
Subnets Designed for Threat Detectio
Honeypot Personas
Honeypot Usage
Beware - Honeypot Recon
Combine Phantom Networks, Honeypots +
Tuning Your SIEM
Keep it Simple
Taught by
RSA Conference
Related Courses
Windows 10 Security FeaturesMicrosoft via edX Palo Alto Networks Cybersecurity Essentials II
Palo Alto Networks via Coursera Cybersecurity Compliance Framework & System Administration
IBM via Coursera Cybersecurity Compliance and Framework
IBM via edX Securing Microsoft Azure Data Access Endpoints
Pluralsight