Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Defending Critical Infrastructure: Deep Enumeration and Proprietary Protocol Analysis

BSidesLV via YouTube

Overview

Explore a comprehensive methodology for deep enumeration and proprietary protocol analysis in this 41-minute conference talk from BSidesLV. Delve into the importance of understanding and dissecting proprietary protocols to enhance critical infrastructure security. Learn how this approach aligns with the 2023 National Cybersecurity Strategy's top priority. Discover a well-defined, repeatable methodology for product security testing that goes beyond basic vulnerability scans and red teaming. Witness a practical demonstration using an actual proprietary protocol, showcasing how threat actors can exploit it and how defenders can mitigate associated risks. Gain valuable insights into skills crucial for cyber security professionals to effectively protect critical infrastructure and businesses relying on these protocols.

Syllabus

Ground Truth, Tue, Aug 6, 12:30 - Tue, Aug 6, CDT

Taught by

BSidesLV

Reviews

Start your review of Defending Critical Infrastructure: Deep Enumeration and Proprietary Protocol Analysis

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.