Completed
How to monitor file access?
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Application Whitelisting: Preventing Unknown Software Execution
Automatically move to the next video in the Classroom when playback concludes
- 1 SECURITY
- 2 Whitelisting Basics
- 3 Common Criteria Requirements
- 4 Brief Comparison
- 5 ATTACK to Kill Chain Mapping
- 6 How programs execute
- 7 Mobile Code example
- 8 Attack points
- 9 How to monitor file access?
- 10 Fanotify Event
- 11 Access Control Policy
- 12 Subject statements
- 13 Sample Policy
- 14 Shipped policy design goals
- 15 Fapolicyd Design
- 16 Safety Measures
- 17 Sources of Trust
- 18 Top level SWID tag example
- 19 Demo
- 20 Statistics report
- 21 Fapolicyd coverage
- 22 Refinements
- 23 Short term improvements
- 24 Unifying the pieces
- 25 IDS Ensemble Model