Windows Based Exploit Chains and Their Detection Mechanism - DefCamp - 2019

Windows Based Exploit Chains and Their Detection Mechanism - DefCamp - 2019

DefCamp via YouTube Direct link

What is their exploitation

3 of 21

3 of 21

What is their exploitation

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Windows Based Exploit Chains and Their Detection Mechanism - DefCamp - 2019

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 About the speaker
  3. 3 What is their exploitation
  4. 4 Single vulnerability exploitation
  5. 5 Exploit a change
  6. 6 Japan Shot
  7. 7 Detecting Lateral Movement
  8. 8 Security Priorities
  9. 9 Event Log
  10. 10 Major Processes
  11. 11 Algorithm
  12. 12 Process Information
  13. 13 Event Logs
  14. 14 PowerPoint Exploit
  15. 15 Image Log Analysis
  16. 16 Machine Learning
  17. 17 Natural Language Processing
  18. 18 Results
  19. 19 Publications
  20. 20 Cybersecurity Exercise
  21. 21 Questions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.