Deception as a Defense
This comprehensive course, "Defense and Deception" equips learners with critical skills to navigate the complex cybersecurity landscape.
Segment 01 - Introduction to instructor
Segment 02 - Critical analysis of patch management and cybersecurity challenges - part 1
Segment 03 - Critical analysis of patch management and cybersecurity challenges - part 2
Segment 04 - XCCDF and OVAL standards for configuration management and vulnerability assessment
Segment 05 - Continuous monitoring and prioritization of vulnerabilities
Segment 06 - Decoding cybersecurity expenditure: Critical examination of strategies and failures
Segment 07 - Perimeter configuration and filtering: safeguarding the digital fortress
Segment 08 - Flipping the model: Taking control of your network
Segment 09 - Perimeter configuration and filtering: Safeguarding the digital fortress
Segment 10 - Deception as a defense: Rethinking security paradigms part 1
Segment 11 - Deception as a defense: Rethinking security paradigms part 2
Segment 12 - Flipping the model: Taking control of your network
Segment 13 - Weaknesses or flaws in products
Segment 14 - A case study on a critical flaw
Segment 15 - Discuss XCCDF and OVA
Segment 16 - Methodology for vulnerability tracking and monitoring part 1
Segment 17 - Methodology for vulnerability tracking and monitoring part 2
Segment 18 - Proactive vulnerability tracking and patch management
Segment 19 - Reducing attack surface and best practices in network security
Segment 20 - Network mines and deception in cybersecurity
Segment 21 - Vulnerability management and router security
Segment 22 - Enhancing cybersecurity through perimeter configuration and filtering part 1
Segment 23 - Enhancing cybersecurity through perimeter configuration and filtering part 2
Segment 24 - Enhancing cybersecurity through perimeter configuration and filtering part 3
Segment 25 - Implementing defense measures in cybersecurity events
Segment 26 - Fundamentals of network filtering and segmentation
Segment 27 - Benefits and challenges of network segmentation
Segment 28 - Internal honeypots, sinkholes, and blackholes in network security
Segment 29 - Best practices for implementing network security measures
Segment 30 - Deception techniques in network security
Segment 31 - Understanding deception techniques in cybersecurity
Segment 32 - Labyrinth tool: Creating ghost IP addresses for deception
Segment 33 - Leveraging ghost IP addresses for threat identification
Segment 34 - Blackholes and decoys: Countermeasures
Segment 35 - Layer 3 and Layer 4 decoys: Diversion and intelligence gathering
Segment 36 - Decoy segments and deception strategies
Segment 37 - Conclusion