Disrupting the Killchain

Disrupting the Killchain

via YouTube Direct link

Splunk

29 of 34

29 of 34

Splunk

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Disrupting the Killchain

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 What is the Killchain
  3. 3 Common threats
  4. 4 Attack Killchain
  5. 5 Recon
  6. 6 Mitigation
  7. 7 Delivery
  8. 8 Defensive medications
  9. 9 Default application associations
  10. 10 Flag malicious file types
  11. 11 Exploitation
  12. 12 Group Policy
  13. 13 Microsoft Office
  14. 14 Floss
  15. 15 Ransomware
  16. 16 Defensive Mitigation
  17. 17 Monitoring Learning
  18. 18 Command and Control
  19. 19 DNS Sinkhole
  20. 20 Threat Lists
  21. 21 DJs
  22. 22 Splash Page
  23. 23 Honey Directory
  24. 24 Bloodhound
  25. 25 Powershell Script
  26. 26 Responder
  27. 27 Passwords
  28. 28 Factor Auth
  29. 29 Splunk
  30. 30 Bloodhound Demo
  31. 31 Weaponization
  32. 32 exploitation phase
  33. 33 privilege escalation
  34. 34 Amanda Berlin

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.