Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore techniques for preventing credential theft and lateral movement after initial compromise in this BSides Cleveland 2016 conference talk. Delve into topics such as red team strategies, secure configuration, Netbios, and ARP spoofing. Learn about the importance of audits, the concept of honey users, and the potential risks associated with the dark web. Gain insights from live demonstrations and practical examples to enhance your understanding of cybersecurity defense mechanisms.