Completed
Everyones system is owned by malware
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Losing Battles Winning Wars - Active Defense Rebooted
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Critical Assets
- 3 Short Game vs Long Game
- 4 Fundamentals
- 5 Asset Management
- 6 Our Own Battlefields
- 7 Defending the Unknown
- 8 Mapping Your Space
- 9 Collecting Data
- 10 Threat Intelligence
- 11 More data is not necessarily good
- 12 Where are you going to put that
- 13 What do you do
- 14 How many alerts
- 15 How many events can an analyst process
- 16 How long does it take to analyze an event
- 17 Do you drown in incidents
- 18 What threats are relevant
- 19 Everyones system is owned by malware
- 20 Three types of threats
- 21 Why does this matter
- 22 Tier 1 automated response
- 23 Destroy image
- 24 Human time expended
- 25 Containment analysis
- 26 Persistent threats
- 27 Human Time
- 28 Chess Match
- 29 Intelligent Prioritization
- 30 External Indicators
- 31 Internal External Content
- 32 Learning from Incidents
- 33 Raising Costs
- 34 The Goal
- 35 Real Security