Completed
Basic Detection → Forensics Process
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Network Forensic Analysis in an Encrypted World
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Justin Warner (@sixdub)
- 3 NSM Quadrant
- 4 Encryption's Impact on the Quadrant
- 5 What this Means for Network Defenders
- 6 Encrypted Traffic Metadata
- 7 Leverage Encryption as an Advantage to Shift Balance of Power to Defenders
- 8 Hunting Primer
- 9 What is Normal?
- 10 Commonality - Asset / Request Distributions
- 11 Send/Recy Ratios by Server Name
- 12 Let's Encrypt Things!
- 13 Different Levels of Certificates
- 14 Changing The Mindset
- 15 Who would abuse free certificates?
- 16 Basic Detection → Forensics Process
- 17 So... Encryption Isn't the End of the World
- 18 Encrypted NSM Security Model (ECNSMM)