Completed
High Interaction – Warning!
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Honeypots for Active Defense - A Practical Guide to Deploying Honeynets Within the Enterprise
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Traditional Defensive Concepts
- 3 InfoSec Realities
- 4 Why Internal Honeypots?
- 5 Honeypot Use Cases
- 6 Types of Honeypots
- 7 Windows Powershell Honeyports
- 8 Artillery Logging Bonus! File Integrity Monitoring
- 9 Learning from Attackers
- 10 Web Labyrinth
- 11 Fake PhpMyAdmin
- 12 $any fake login panel
- 13 Honeybadger
- 14 Emulate various services and capture verbose data on attacks
- 15 Analysis Tools • Log Rhythm Network Monitor and SIEM
- 16 Routers and Switches
- 17 High Interaction – Warning!
- 18 Document Bugging
- 19 More Tricks
- 20 Monitoring • Dedicated SOC - Security Operations Center
- 21 Enterprise Threat Intelligence
- 22 Event Correlation
- 23 Honeypot Dashboards • Honey Drive3 comes complete with dashboards and enhancement scripts to display interesting data.
- 24 Closing Thoughts
- 25 Works Cited & Recommended Reading • Strand, John, and Asadoorian, Paul Offensive Countermeasures: The Art of Active Defense 2013