Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Beyond LSASS - Cutting Edge Techniques for Undetectable Threat Emulation

WEareTROOPERS via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore advanced threat emulation techniques that go beyond traditional LSASS (Local Security Authority Subsystem Service) methods in this 36-minute conference talk from TROOPERS25. Discover cutting-edge approaches for conducting undetectable security assessments and penetration testing while learning how modern attackers are evolving their tactics to bypass conventional detection mechanisms. Gain insights into sophisticated methods that security professionals can use to better understand and defend against advanced persistent threats, with practical demonstrations of techniques that remain under the radar of standard security monitoring tools.

Syllabus

TROOPERS25: Beyond LSASS - Cutting Edge Techniques for Undetectable Threat Emulation

Taught by

WEareTROOPERS

Reviews

Start your review of Beyond LSASS - Cutting Edge Techniques for Undetectable Threat Emulation

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.