Completed
Security Priorities
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Windows Based Exploit Chains and Their Detection Mechanism - DefCamp - 2019
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 About the speaker
- 3 What is their exploitation
- 4 Single vulnerability exploitation
- 5 Exploit a change
- 6 Japan Shot
- 7 Detecting Lateral Movement
- 8 Security Priorities
- 9 Event Log
- 10 Major Processes
- 11 Algorithm
- 12 Process Information
- 13 Event Logs
- 14 PowerPoint Exploit
- 15 Image Log Analysis
- 16 Machine Learning
- 17 Natural Language Processing
- 18 Results
- 19 Publications
- 20 Cybersecurity Exercise
- 21 Questions