Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Advanced Attackers Hiding Inside Encrypted Traffic at the Endpoint

via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore advanced techniques used by sophisticated attackers to conceal their activities within encrypted traffic at the endpoint in this GrrCon 2018 conference talk. Delve into Jared Phipps' expertise as he discusses the rapid evolution of threat markets, the increasing complexity of Advanced Persistent Threats (APTs), and the challenges of modern threat intelligence. Examine file list attacks, persistent malware problems, and the growing trend of threat actors as services. Analyze the disappearance of traditional network perimeters and the implications for enterprise security. Gain insights into protecting critical assets, addressing talent shortages, and developing effective security strategies. Investigate real-world scenarios, including WordPress vulnerabilities, reverse forensics techniques, and the impact of ransomware attacks.

Syllabus

Intro
Jareds background
Threat markets evolve quickly
APT is greater than malware
Sentinel One 2018 Security Index
File List Attacks
Malware Remains a Constant Problem
Threat Intel is Getting Harder
Enterprise Risk Index
Extortion
The End of Patience
Threat Actors as Services
Perimeters Disappearing
What Are You Protecting
Talent
Strategy
Scenarios
WordPress
From the attacker perspective
Reverse forensics
Ransomware

Reviews

Start your review of Advanced Attackers Hiding Inside Encrypted Traffic at the Endpoint

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.