Advanced Breaches of 2013 vs Behavioral Detection - GrrCON 2014

Advanced Breaches of 2013 vs Behavioral Detection - GrrCON 2014

via YouTube Direct link

Introduction

1 of 23

1 of 23

Introduction

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Advanced Breaches of 2013 vs Behavioral Detection - GrrCON 2014

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Definitions
  3. 3 NetFlow
  4. 4 Silk
  5. 5 Magic Quadrant
  6. 6 Signature Based Detection
  7. 7 Metadata
  8. 8 Boolean Detection
  9. 9 Behavioral Analysis
  10. 10 Anomaly Detection
  11. 11 Algorithmic Detection
  12. 12 Histograms
  13. 13 Service Type
  14. 14 Ukraine
  15. 15 Data disclosure
  16. 16 The Customer
  17. 17 Organized Criminals
  18. 18 Trade Secret Deal
  19. 19 Data Leaving Network
  20. 20 State Sponsored Attack
  21. 21 Address Scanning
  22. 22 Traffic Graph
  23. 23 Incidents

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.