Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore techniques for detecting and analyzing network breaches in this 45-minute conference talk from LASCON. Learn how to identify anomalous behavior, capture host images, and determine ongoing malware and hacker activity. Gain insights from experienced Red Team members as they share their expertise in Blue Team activities. Discover approaches for locating suspicious network activity, analyzing it with certainty, and eradicating threats. Cover topics such as incident response, entry points, telemetry, Active Directory, content filtering, general traffic analysis, human activity detection, and domain account monitoring. Understand common problems, assess the value of breach assessments, identify gaps in security, and explore future developments in cybersecurity. Equip yourself with the knowledge to answer critical questions about your organization's security posture and ability to detect ongoing attacks.