Knowing the Enemy - Creating a Cyber Threat Actor Attribution Program

Knowing the Enemy - Creating a Cyber Threat Actor Attribution Program

via YouTube Direct link

Introduction

1 of 30

1 of 30

Introduction

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Knowing the Enemy - Creating a Cyber Threat Actor Attribution Program

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Morse Code
  3. 3 Sun Tzu
  4. 4 Program
  5. 5 Customers want more
  6. 6 spear phishing
  7. 7 business email compromise
  8. 8 make it work
  9. 9 this is getting to
  10. 10 social engineering
  11. 11 whats a fish
  12. 12 stats
  13. 13 numbers
  14. 14 monitoring
  15. 15 data sources
  16. 16 attribute attribution
  17. 17 poker tells
  18. 18 behaviors and habits
  19. 19 human limitations
  20. 20 resources
  21. 21 attack habits
  22. 22 attribution
  23. 23 forensic evidence
  24. 24 collecting too much
  25. 25 extracting the files
  26. 26 common strings
  27. 27 spreadsheet
  28. 28 mount ego
  29. 29 investigative tools
  30. 30 hacker dread

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.