Finance Certifications Goldman Sachs & Amazon Teams Trust
Build AI Apps with Azure, Copilot, and Generative AI — Microsoft Certified
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Learn advanced command and control (C2) communication techniques in this 41-minute conference talk that explores both detection and evasion methods in malware development. Discover how beacon detection operates at the network level through comprehensive analysis of content, transports, and tradecraft using practical examples from popular C2 frameworks. Examine various approaches defenders can adapt to identify beaconing activity within their networks. Explore sophisticated C2 implementations including client-side and server-side traffic encoders, and understand how to employ middleware for beaconing through high-reputation services to maintain stealth in network communications.
Syllabus
10. Dominic Chell: Hiding in Plain Sight
Taught by
x33fcon