Completed
HOW CAN DEFENDERS USE GRAPHS?
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Breaking the Attack Graph - How to Leverage Graphs to Strengthen Security in a Domain Environment
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 BLOODHOUND
- 3 GOFETCH
- 4 ATTACKERS VS. DEFENDERS ATTACKERS
- 5 HOW CAN DEFENDERS USE GRAPHS?
- 6 DATA SOURCES
- 7 PREVENTION: VULNERABLE NODES
- 8 PREVENTION: DISCONNECTING NODES
- 9 DETECTION: LOGON GRAPH
- 10 DETECTION: WEIGHTED LOGON GRAPH
- 11 DETECTION: EXAMPLE
- 12 DETECTION: PROS & cons
- 13 INVESTIGATION