Completed
Types of Threats
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Losing Battles Winning Wars - Active Defense Rebooted
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Widgets dont help
- 3 Python fans
- 4 Visibility
- 5 Complexity
- 6 Fail
- 7 Do you control the situation
- 8 Critical assets exfiltrated
- 9 Data governance projects
- 10 Recovering from a breach
- 11 What happens if you fail
- 12 Website defacements
- 13 Stolen trade secrets
- 14 Defense perspective
- 15 Attack perspective
- 16 Objective
- 17 We dont suck at security
- 18 Short game
- 19 Fundamentals
- 20 Asset Management
- 21 Network Map
- 22 Home Ice Advantage
- 23 Mapping Your Space
- 24 Collecting Data
- 25 Threat Intelligence
- 26 Intelligence
- 27 Where
- 28 Alerts
- 29 Pentesting
- 30 What threats are relevant
- 31 Malware
- 32 Types of Threats
- 33 Why Does This Matter
- 34 Tier 1 Automated Response
- 35 Reimage
- 36 Human time expended
- 37 Persistent threats
- 38 Human Time
- 39 Intelligent Prioritization
- 40 Learning
- 41 Raising Costs
- 42 The Goal
- 43 Real Security