Lessons Learned from Black Hat’s Infrastructure - The Tweets Must Flow

Lessons Learned from Black Hat’s Infrastructure - The Tweets Must Flow

44CON Information Security Conference via YouTube Direct link

Threat modeling

17 of 33

17 of 33

Threat modeling

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Lessons Learned from Black Hat’s Infrastructure - The Tweets Must Flow

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 My experience at Black Hat
  3. 3 What is Black Hat
  4. 4 Black Hats Infrastructure
  5. 5 Supporting Infrastructure
  6. 6 Events
  7. 7 Volunteers
  8. 8 Network
  9. 9 Security
  10. 10 Wired Infrastructure
  11. 11 Handmade Cables
  12. 12 Network Problems
  13. 13 How it was fixed
  14. 14 Segmenting the network
  15. 15 Quality of service
  16. 16 Gateway laptop
  17. 17 Threat modeling
  18. 18 External attackers
  19. 19 Internal attackers
  20. 20 Threat models
  21. 21 Wireless security
  22. 22 Other Black Hat networks
  23. 23 Wireless spoofing
  24. 24 Black Hat is a nice network
  25. 25 Design goals
  26. 26 Keeping it simple
  27. 27 No services right
  28. 28 Europe
  29. 29 End Results
  30. 30 Lessons Learned
  31. 31 Security is never a priority
  32. 32 Building security into operations
  33. 33 Market yourself

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.