Deploying Honeypots to Gather Actionable Threat Intelligence

Deploying Honeypots to Gather Actionable Threat Intelligence

via YouTube Direct link

What this talk is about

3 of 30

3 of 30

What this talk is about

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Deploying Honeypots to Gather Actionable Threat Intelligence

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Backstory
  3. 3 What this talk is about
  4. 4 DISCLAIMER
  5. 5 Outline
  6. 6 What is threat intelligence?
  7. 7 TI Phases
  8. 8 Collection
  9. 9 Data / Event Correlation
  10. 10 SIEM
  11. 11 How do we increase accuracy?
  12. 12 What's a honeypot?
  13. 13 Common Problems
  14. 14 Low Interaction Honeypots
  15. 15 Medium Interaction Honeypots
  16. 16 High Interaction Honeypots
  17. 17 Why High Interaction for TI?
  18. 18 Making It Count
  19. 19 They MUST look legit
  20. 20 Adding Production Value
  21. 21 HI Honeypot Considerations
  22. 22 Considerations With Virtualization
  23. 23 Cloud Considerations
  24. 24 Examples of Canaries
  25. 25 Market Watch
  26. 26 Recap
  27. 27 Conclusion
  28. 28 Next Development
  29. 29 References
  30. 30 People to Follow

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.