Completed
Identifying new attack profiles
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Open Source Threat Intelligence - Developing a Threat Intelligence Program Using Open Source Tool
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Overview
- 3 First Attack
- 4 Travel Advisory
- 5 Router Access Control Lists
- 6 Incident Response
- 7 Enhanced Monitoring
- 8 Proof of Concept
- 9 Open Source
- 10 Honey Pots
- 11 Geek Card
- 12 Audit
- 13 Collective Intelligence Framework
- 14 Honeypots
- 15 Proof Concept
- 16 Native Tools
- 17 Identifying new attack profiles
- 18 Identifying maps of interest
- 19 Who would attack us
- 20 Why are we targets
- 21 What I accomplished
- 22 Business enabler
- 23 Thanks