Honeypots for Active Defense - A Practical Guide to Deploying Honeynets Within the Enterprise

Honeypots for Active Defense - A Practical Guide to Deploying Honeynets Within the Enterprise

via YouTube Direct link

Enterprise Threat Intelligence

21 of 25

21 of 25

Enterprise Threat Intelligence

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Honeypots for Active Defense - A Practical Guide to Deploying Honeynets Within the Enterprise

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Traditional Defensive Concepts
  3. 3 InfoSec Realities
  4. 4 Why Internal Honeypots?
  5. 5 Honeypot Use Cases
  6. 6 Types of Honeypots
  7. 7 Windows Powershell Honeyports
  8. 8 Artillery Logging Bonus! File Integrity Monitoring
  9. 9 Learning from Attackers
  10. 10 Web Labyrinth
  11. 11 Fake PhpMyAdmin
  12. 12 $any fake login panel
  13. 13 Honeybadger
  14. 14 Emulate various services and capture verbose data on attacks
  15. 15 Analysis Tools • Log Rhythm Network Monitor and SIEM
  16. 16 Routers and Switches
  17. 17 High Interaction – Warning!
  18. 18 Document Bugging
  19. 19 More Tricks
  20. 20 Monitoring • Dedicated SOC - Security Operations Center
  21. 21 Enterprise Threat Intelligence
  22. 22 Event Correlation
  23. 23 Honeypot Dashboards • Honey Drive3 comes complete with dashboards and enhancement scripts to display interesting data.
  24. 24 Closing Thoughts
  25. 25 Works Cited & Recommended Reading • Strand, John, and Asadoorian, Paul Offensive Countermeasures: The Art of Active Defense 2013

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.