The Fox is in the Henhouse - Detecting a Breach Before the Damage is Done

The Fox is in the Henhouse - Detecting a Breach Before the Damage is Done

via YouTube Direct link

Intro

1 of 32

1 of 32

Intro

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

The Fox is in the Henhouse - Detecting a Breach Before the Damage is Done

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 The problem
  3. 3 Visibility
  4. 4 The Solution
  5. 5 Choosing Your Tools
  6. 6 Tools
  7. 7 Tools can be greedy
  8. 8 Symbiotic security
  9. 9 The question
  10. 10 Flow Data
  11. 11 HD Moore
  12. 12 Pattern Query Language
  13. 13 Malware Domain List
  14. 14 Results
  15. 15 Symbiotic Example
  16. 16 Darknet Analytics
  17. 17 Data Exfiltration
  18. 18 Port Scans
  19. 19 Outbound Connections
  20. 20 False Positives
  21. 21 Poll
  22. 22 Walter
  23. 23 VirusTotal
  24. 24 McAfee Alerts
  25. 25 McAfee Timeline
  26. 26 Custom Integration
  27. 27 Collective Intelligence Framework
  28. 28 RealTime Decision Making
  29. 29 Taking Action
  30. 30 Security Analytics
  31. 31 LastCon
  32. 32 Questions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.