Completed
YOU ARE NOT AN ISP Unless, of course, you are ONLY PROVIDE RESPONSES FOR DOMAINS YOU OWN
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
The Domain Name System - DNS Operation, Threats, and Security Intelligence
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 DOMAIN NAME SYSTEM Operation, Threats, and Security Intelligence
- 3 AMPLIFICATION ATTACK PROCESS
- 4 PROPER DNS SERVER CONFIGURATION
- 5 YOU ARE NOT AN ISP Unless, of course, you are ONLY PROVIDE RESPONSES FOR DOMAINS YOU OWN
- 6 BLIND TRANSFERS ARE BAD
- 7 DOMAIN HIJACKING
- 8 HOW DO WE STOP THIS?
- 9 DNS SECURITY USE CASES
- 10 SSL TRAFFIC CORRELATION Problem Reading encyrpted requests is hard
- 11 THREAT INTELLIGENCE USING DNS DATA DNS lookups for known malicious sites Hosting providers associated with ransomware
- 12 FORENSIC INVESTIGATIONS
- 13 DNS DATA EXFILTRATION Detect DNS tunneling - abnormally high number of lookups for a single domain
- 14 THREAT INTELLIGENCE RESEARCH