Secure Coding Best Practices - Threat Hunting

Secure Coding Best Practices - Threat Hunting

CppNow via YouTube Direct link

Introduction

1 of 26

1 of 26

Introduction

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Secure Coding Best Practices - Threat Hunting

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Threat hunting
  3. 3 Intrusion kill chain
  4. 4 Project Aurora
  5. 5 Reconning Systems
  6. 6 Phishing
  7. 7 Selecting the Attack Vector
  8. 8 The Golden Nugget
  9. 9 Threat Modeling
  10. 10 Threat Classification
  11. 11 Trust Boundaries
  12. 12 Example
  13. 13 No Safe Spaces
  14. 14 Stride Model
  15. 15 Cloud Repo
  16. 16 Information Disclosure
  17. 17 Denial of Service
  18. 18 Video Sensor
  19. 19 Blind
  20. 20 Privilege Escalation
  21. 21 Capture Process
  22. 22 Audit Trail
  23. 23 Surface
  24. 24 Evil Bit Set
  25. 25 Response to pushback
  26. 26 Troy Hunt

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.