Completed
Introduction
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Fighting Next-Generation Adversaries with Shared Threat Intelligence
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 When did the problem begin
- 3 Verification
- 4 Breaking Systems
- 5 Buffer Overflow
- 6 Security is a core requirement
- 7 Where does that leave us
- 8 Not getting more successful
- 9 The attacker has to be right
- 10 In 2014 we will show up barely half staffed
- 11 Security roles are vacant
- 12 What it takes to become a doctor
- 13 Top 10 computer science programs
- 14 Large attacks
- 15 Under pressure
- 16 Working together
- 17 Discovery
- 18 Challenges
- 19 Key Principles
- 20 Automated Community
- 21 Brute Force Login
- 22 Community Participation
- 23 Conclusion
- 24 Questions
- 25 Application Layer Monitoring
- 26 Outro