Honeypots 2.0 - A New Twist on Defending Enterprise Networks

Honeypots 2.0 - A New Twist on Defending Enterprise Networks

Security BSides San Francisco via YouTube Direct link

Conclusion

20 of 20

20 of 20

Conclusion

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Honeypots 2.0 - A New Twist on Defending Enterprise Networks

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Industrial Internet of Things
  3. 3 Digital Twin
  4. 4 Cyber Security
  5. 5 Dynamic Deception
  6. 6 Types of Deception
  7. 7 Signal Injection
  8. 8 What is a Honeypot
  9. 9 Goals of Honeypots
  10. 10 Insider Threat
  11. 11 Python Implementation
  12. 12 Output
  13. 13 Code Complexity
  14. 14 Twisted
  15. 15 Twisted Example
  16. 16 Lesson 19 Less Than 20 Lines of Code
  17. 17 Lesson 19 Dynamic Example
  18. 18 Modbus Example
  19. 19 Scaling
  20. 20 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.