Implementing Continuous Offense to Measure and Monitor Cybersecurity Defenses - DefCamp - 2019

Implementing Continuous Offense to Measure and Monitor Cybersecurity Defenses - DefCamp - 2019

DefCamp via YouTube Direct link

Introduction

1 of 34

1 of 34

Introduction

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Implementing Continuous Offense to Measure and Monitor Cybersecurity Defenses - DefCamp - 2019

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Welcome
  3. 3 Personal Background
  4. 4 Metasploit
  5. 5 Wannacry
  6. 6 Awareness
  7. 7 Who would hack your network
  8. 8 Prevention capabilities are not good
  9. 9 Know whats in your network
  10. 10 We can all do this
  11. 11 Lab to test
  12. 12 Lack of measurement
  13. 13 Maturity levels
  14. 14 Vulnerability assessment
  15. 15 The solution of security
  16. 16 Breach attack simulation tools
  17. 17 Where to practice
  18. 18 Hacking Yourself
  19. 19 Example
  20. 20 Sandboxing
  21. 21 Testing
  22. 22 Kali Linux
  23. 23 Powershell
  24. 24 Organization
  25. 25 Tools
  26. 26 Endpoint
  27. 27 Frequency Vulnerability Assessment
  28. 28 Malware Polymorphism
  29. 29 Continuous Testing
  30. 30 Machine Learning
  31. 31 Simulation
  32. 32 Summary
  33. 33 Optimization
  34. 34 Questions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.