Automated Human Vulnerability Scanning With AVA

Automated Human Vulnerability Scanning With AVA

Black Hat via YouTube Direct link

Demo

33 of 46

33 of 46

Demo

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Automated Human Vulnerability Scanning With AVA

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Breaking conventions
  3. 3 You might feel uncomfortable
  4. 4 What are we discussing
  5. 5 I like people
  6. 6 Weve conquered it
  7. 7 Theyre relatively lazy
  8. 8 Technology
  9. 9 Vulnerability
  10. 10 Defense
  11. 11 Compliance
  12. 12 Shame victims
  13. 13 We are connected species
  14. 14 We do bits and pieces
  15. 15 We dont test
  16. 16 Why we dont test
  17. 17 Border devices arent enough
  18. 18 What is AVA
  19. 19 What does AVA mean
  20. 20 Phases
  21. 21 Principle of Least Privilege
  22. 22 Pulling Information
  23. 23 Phishing Attacks
  24. 24 Honeypot SMS
  25. 25 Powerplay
  26. 26 Call to Action
  27. 27 Giving the option of succeeding
  28. 28 Behavior over time
  29. 29 Training is big business
  30. 30 Graphs
  31. 31 Predictive Behavior Analysis
  32. 32 Boring Technologies
  33. 33 Demo
  34. 34 Case Study
  35. 35 Public Interest Security Tool
  36. 36 Threat Intelligence Application Security
  37. 37 Spam
  38. 38 Privacy
  39. 39 Complexity
  40. 40 Scale of Data
  41. 41 Why Compromise
  42. 42 Why We Need Unicorns
  43. 43 Nest
  44. 44 Google
  45. 45 Learn more
  46. 46 Questions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.