Completed
Introduction
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Profiling the Attacker - Using Offender Profiling in SOC Environments
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Preemptive security
- 3 Outline
- 4 Who am I
- 5 What is offender profiling
- 6 Why is offender profiling important
- 7 Security is important
- 8 Examples of offender profiling
- 9 How offender profiling works
- 10 Alices example
- 11 Method Zero
- 12 Method One Frequency
- 13 Method Two Frequency
- 14 Method Three Frequency
- 15 Method Five Classification
- 16 Summary