Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Early Detection through Deception

via YouTube

Overview

Explore early detection techniques through deception in cybersecurity with Jason Nester's 57-minute conference talk from BSides Cleveland 2019. Delve into the concept of deception, its advantages and challenges, and practical implementation strategies. Learn about various deceptive scenarios, including foreign devices on networks, compromised trusted systems, and internet manipulation. Discover advanced deception tactics like honey badger systems, deceptive metadata, and countering spear-phishing attempts. Gain insights into the ongoing cat-and-mouse game between attackers and defenders, and participate in a Q&A session to further enhance your understanding of this critical cybersecurity approach.

Syllabus

Intro
What is Deception?
All Rainbows and Unicorns?
Before You Begin...
Gimme Some Examples
Foreign Device on Network
Compromised Trusted System
Messing With the Internet
MOAR DECEPTION
For Example...
Honey Badger Don't Give A...
Deceptive Metadata
Spear-phishing / Credential Theft
The Cat and Mouse Game Continues
Questions?

Reviews

Start your review of Early Detection through Deception

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.