Completed
Do you decrypt network traffic
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
The Use of Covert Communications in Modern Cyber Attacks
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Phases of a cyber attack
- 3 The smart guys
- 4 Behavior
- 5 Encryption
- 6 Do you decrypt network traffic
- 7 Behavior patterns
- 8 Hip messages
- 9 Demo
- 10 HTTP
- 11 Survey Report
- 12 Zombie Guts
- 13 Use Cases
- 14 Identifying Behavior
- 15 Pulling Instructions
- 16 What poses the greatest risk
- 17 Game of Thrones
- 18 Remote Access
- 19 GlassRat
- 20 Breaking Bad
- 21 Common Techniques
- 22 NonHuman Devices
- 23 Summary