Completed
Collection
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Deploying Honeypots to Gather Actionable Threat Intelligence
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Backstory
- 3 What this talk is about
- 4 DISCLAIMER
- 5 Outline
- 6 What is threat intelligence?
- 7 TI Phases
- 8 Collection
- 9 Data / Event Correlation
- 10 SIEM
- 11 How do we increase accuracy?
- 12 What's a honeypot?
- 13 Common Problems
- 14 Low Interaction Honeypots
- 15 Medium Interaction Honeypots
- 16 High Interaction Honeypots
- 17 Why High Interaction for TI?
- 18 Making It Count
- 19 They MUST look legit
- 20 Adding Production Value
- 21 HI Honeypot Considerations
- 22 Considerations With Virtualization
- 23 Cloud Considerations
- 24 Examples of Canaries
- 25 Market Watch
- 26 Recap
- 27 Conclusion
- 28 Next Development
- 29 References
- 30 People to Follow