Network Compromise for the Technically Challenged (Dummies)

Subscribers:
23,700
Published on ● Video Link: https://www.youtube.com/watch?v=SRopYDahgcY



Duration: 1:08:26
271 views
9


You can’t defend against what you don’t understand! To protect organizational assets from compromise you need to know how the attacker is going to act. This talk is intended to be a mostly non-technical talk that won’t show you how to do it but shows you how it’s done.
The seven steps covered are:
1. Reconnaissance
2. Scanning
3. Initial Point of Compromise
4. Lateral Movement
5. Data Exploitation
6. Creating Back Doors
7. Cleaning Up

Doc Blackburn has IT experience spanning four decades in application and software design and administration, server and network administration, cloud services and website development, along with security and compliance management and experience in several other technical disciplines. His interest in computers started in 1982 when he first started programming on the Texas Instruments TI-99 4a console, Bally Home Library Computer, and Commodore 64 systems and had continued as a dedicated computer hobbyist until he decided to make information technology a full-time career in 1998.

More on Doc: https://www.sans.org/profiles/doc-blackburn/
More on SANS SEC301: sans.org/sec301




Other Videos By SANS Cyber Defense


2020-12-01Taking Your Detection Program to the Next Level | SANS Cyber Defense Forum 2020
2020-11-29Analysis 101 for Incident Responders | SANS Cyber Defense Forum 2020
2020-11-28Hiding in the clouds: How attackers can use applications for sustained persistence & how to find it
2020-11-27Asking Questions and Writing Effectively | SANS Cyber Defense Forum 2020
2020-11-25New Tools for your Threat Hunting Toolbox | SANS Cyber Defense Forum 2020
2020-11-16Full Packet Capturing with TShark for Continuous Monitoring & Threat Intel via IP, Domains, & URLS
2020-09-14PowerShell 2020: State of the Art / Hack / Infection
2020-07-30Social Engineering Your Way to Success | Justin Henderson & Ismael Valenzuela
2020-07-22Extending Your Home Lab to include Cloud
2020-07-17Danger Stewards – Measuring Risk and Predicting the Future for Fun and Profit
2020-07-17Network Compromise for the Technically Challenged (Dummies)
2020-07-17You Can Write an Infosec Book!
2020-07-17ICMP: A world beyond ping
2020-07-17CISSP Test-Taking Tactics: Successfully Navigating Adaptive Exams
2020-07-08Threat Intelligence: How to Focus Fire on the Bad Guys Coming for Your Network-SANS Blue Team Summit
2020-07-08DevBlue: Applying Software Engineering Practices to Blue Teaming for the Win! -SANS Blue Team Summit
2020-07-08Put Some Power in Your Shell: POSH for Incident Response at Scale - SANS Blue Team Summit
2020-07-08Creativity, Convergence, & Choices: Security Analyst Thinking Modes - SANS Blue Team Summit
2020-07-08Threat Hunting via DNS with Eric Conrad - SANS Blue Team Summit 2020
2020-07-08Cobot Uprising: Smart Automation for Blue Teams with Mark Orlando - SANS Blue Team Summit 2020
2020-07-08Real-Time OSINT: Investigating Events as They Happen with Josh Huff | SANS OSINT Summit 2020