Application Whitelisting: Preventing Unknown Software Execution

Application Whitelisting: Preventing Unknown Software Execution

Linux Foundation via YouTube Direct link

ATTACK to Kill Chain Mapping

5 of 25

5 of 25

ATTACK to Kill Chain Mapping

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Application Whitelisting: Preventing Unknown Software Execution

Automatically move to the next video in the Classroom when playback concludes

  1. 1 SECURITY
  2. 2 Whitelisting Basics
  3. 3 Common Criteria Requirements
  4. 4 Brief Comparison
  5. 5 ATTACK to Kill Chain Mapping
  6. 6 How programs execute
  7. 7 Mobile Code example
  8. 8 Attack points
  9. 9 How to monitor file access?
  10. 10 Fanotify Event
  11. 11 Access Control Policy
  12. 12 Subject statements
  13. 13 Sample Policy
  14. 14 Shipped policy design goals
  15. 15 Fapolicyd Design
  16. 16 Safety Measures
  17. 17 Sources of Trust
  18. 18 Top level SWID tag example
  19. 19 Demo
  20. 20 Statistics report
  21. 21 Fapolicyd coverage
  22. 22 Refinements
  23. 23 Short term improvements
  24. 24 Unifying the pieces
  25. 25 IDS Ensemble Model

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.