Completed
Defensive Mitigation
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Disrupting the Killchain
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 What is the Killchain
- 3 Common threats
- 4 Attack Killchain
- 5 Recon
- 6 Mitigation
- 7 Delivery
- 8 Defensive medications
- 9 Default application associations
- 10 Flag malicious file types
- 11 Exploitation
- 12 Group Policy
- 13 Microsoft Office
- 14 Floss
- 15 Ransomware
- 16 Defensive Mitigation
- 17 Monitoring Learning
- 18 Command and Control
- 19 DNS Sinkhole
- 20 Threat Lists
- 21 DJs
- 22 Splash Page
- 23 Honey Directory
- 24 Bloodhound
- 25 Powershell Script
- 26 Responder
- 27 Passwords
- 28 Factor Auth
- 29 Splunk
- 30 Bloodhound Demo
- 31 Weaponization
- 32 exploitation phase
- 33 privilege escalation
- 34 Amanda Berlin