Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Addressing Tactics Related to Edge Device Compromise - Security Detection and Defense

x33fcon via YouTube

Overview

Watch a 41-minute conference talk from x33fcon exploring how threat actors are shifting their attack strategies to edge devices and learn effective defensive measures. Dive into the evolving landscape of cybersecurity where adversaries are adapting to enhanced EDR solutions by targeting less monitored assets like routers, firewalls, and virtual machine hypervisors. Examine real-world cases of edge device compromises, understand the unique challenges these attacks present for forensic analysis and detection, and discover practical strategies for both blue and red teams. Learn how to implement comprehensive threat hunting and intelligence gathering techniques to reduce dwell time and enable early detection of campaigns targeting edge devices. Master the complex approach to defending against these tactics while gaining insights into how to incorporate these methods into adversarial activity emulation.

Syllabus

4. Kamil Bojarski : Blank Space - Addresing Tactics Related To Compromise Of Edge Devices

Taught by

x33fcon

Reviews

Start your review of Addressing Tactics Related to Edge Device Compromise - Security Detection and Defense

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.