Главная
Study mode:
on
1
Intro
2
Business Internet Security Report
3
Deceptive Ops Challenge
4
Cyber Threat Intelligence
5
Types of Cyber Threat Intelligence
6
Quality of Threat Intelligence Feed
7
Network Telescope
8
Honeynet Interactions
9
Understanding Attackers
10
Protecting Assets
11
Honeypots
12
Skills required
13
Threat intelligence trends
Description:
Explore deceptive operations and honeynet design in this 51-minute conference talk from DefCamp 2021. Delve into the Deceptive Ops Challenge, cyber threat intelligence types, and quality assessment of threat intelligence feeds. Learn about network telescopes, honeynet interactions, and techniques for understanding attackers. Discover essential skills for protecting assets, implementing honeypots, and staying current with threat intelligence trends. Gain valuable insights from this hands-on presentation, part of DefCamp's renowned series on hacking and information security in Central and Eastern Europe.

Deceptive Ops and Honeynet Design - DefCamp - 2021

DefCamp
Add to list
0:00 / 0:00