What You Need to Know Before
You Start
Starts 16 June 2025 11:04
Ends 16 June 2025
00
days
00
hours
00
minutes
00
seconds
49 minutes
Optional upgrade avallable
Not Specified
Progress at your own speed
Conference Talk
Optional upgrade avallable
Overview
Explore exploit kits and indicators of compromise with expert Brad Duncan, gaining insights into cybersecurity threats and detection techniques.
Syllabus
- Introduction to Exploit Kits
- Common Exploit Kits in Use
- Indicators of Compromise (IoCs)
- Techniques for Detecting Compromises
- Analysis of Exploit Kit Campaigns
- Mitigation and Response Strategies
- Legal and Ethical Considerations
- Future of Exploit Kits and IoCs
- Conclusion and Key Takeaways
- Additional Resources
Definition and Purpose
History and Evolution
How Exploit Kits Work
Overview of Popular Exploit Kits
Case Studies of Notable Incidents
Analysis of Current Trends
Definition and Importance
Types of IoCs
Gathering and Identifying IoCs
Tools and Technologies
Best Practices for Monitoring and Detection
Analysis of Network Traffic and Logs
Lifecycle of an Attack
Understanding Payloads and Malicious Activity
Case Studies and Real-World Examples
Preventive Measures
Incident Response Planning
Recovery and Lessons Learned
Laws Related to Cybersecurity
Ethical Responsibilities in Handling IoCs
Global Perspectives and Collaboration
Emerging Threats and Technologies
Predictions and Preparing for the Future
Advancing Detection Techniques
Summary of Important Concepts
Final Q&A Session with Brad Duncan
Recommended Readings
Online Tools and Platforms
Community and Networking Opportunities
Subjects
Conference Talks