Главная
Study mode:
on
1
Introduction
2
New Technologies
3
Development Process
4
Tools
5
Layered Security
6
How effective are your defenses
7
Threat Modeling
8
Transforms
9
Tungsten
10
Tuning IPS
11
NGFW
12
IPS
13
Endpoint Protection
14
Corporate Infrastructure
15
Endpoint Protection Credit
16
Head Mask
17
Exploits
18
Bubble View
19
Threat Protection
20
Conclusions
21
NSS
22
Macro approaches
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Explore defense evasion modeling techniques in this 57-minute conference talk from BSidesLV 2013. Delve into new technologies, development processes, and tools for layered security. Evaluate the effectiveness of your defenses through threat modeling, transforms, and tuning of various security components including IPS, NGFW, and endpoint protection. Examine corporate infrastructure, exploit techniques, and threat protection strategies. Gain insights into NSS and macro approaches for enhancing overall security posture.

Defense Evasion Modeling

BSidesLV
Add to list
0:00 / 0:00