What You Need to Know Before
You Start
Starts 9 June 2025 19:31
Ends 9 June 2025
00
days
00
hours
00
minutes
00
seconds
27 minutes
Optional upgrade avallable
Not Specified
Progress at your own speed
Conference Talk
Optional upgrade avallable
Overview
Explore techniques hackers use to bypass AI-enabled endpoint detection, including malware disguises and virtualization isolation. Learn about vulnerability exposure and privileged access management.
Syllabus
- Introduction to AI-Enabled Endpoint Detection
- Techniques for Evading Endpoint Detection
- Vulnerability Exposure
- Privileged Access Management
- Hands-On Lab: Simulating and Detecting Bypass Techniques
- Case Studies and Real-World Examples
- Advanced Defense Strategies
- Future Trends in Endpoint Detection and Evasion
- Course Summary and Key Takeaways
- Final Assessment and Course Completion
Overview of AI in Cybersecurity
Basics of Endpoint Detection Tools
Limitations of AI in Endpoint Security
Malware Disguises
Polymorphic and Metamorphic Malware
Code Obfuscation and Encryption
Virtualization Isolation
Introduction to Virtualization Technologies
Techniques for Detecting and Evading Virtual Machines
Identifying Common Vulnerabilities in Detection Tools
Exploitation Techniques Used by Hackers
Strategies for Reducing Vulnerability Exposure
Understanding Privilege Escalation
Methods Hackers Use to Elevate Privileges
Best Practices for Managing and Securing Privileged Accounts
Setting Up a Secure Testing Environment
Demonstration of Bypass Techniques
Practice and Mitigation Strategies
Analysis of High-Profile Breaches
Lessons Learned and Security Improvements
Behavior-Based Detection Approaches
Integrating Threat Intelligence with Endpoint Security
Continuous Monitoring and Incident Response
Emerging Threats and Techniques
The Role of AI in Future Cybersecurity Solutions
Recap of Bypass Techniques and Defenses
Resources for Continued Learning
Subjects
Conference Talks