Profiling the Attacker - Using Offender Profiling in SOC Environments

Profiling the Attacker - Using Offender Profiling in SOC Environments

Security BSides London via YouTube Direct link

Introduction

1 of 16

1 of 16

Introduction

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Profiling the Attacker - Using Offender Profiling in SOC Environments

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Preemptive security
  3. 3 Outline
  4. 4 Who am I
  5. 5 What is offender profiling
  6. 6 Why is offender profiling important
  7. 7 Security is important
  8. 8 Examples of offender profiling
  9. 9 How offender profiling works
  10. 10 Alices example
  11. 11 Method Zero
  12. 12 Method One Frequency
  13. 13 Method Two Frequency
  14. 14 Method Three Frequency
  15. 15 Method Five Classification
  16. 16 Summary

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.