What You Need to Know Before
You Start

Starts 16 June 2025 11:04

Ends 16 June 2025

00 days
00 hours
00 minutes
00 seconds
course image

I Got You - Exploit Kits and Indicators of Compromise

Explore exploit kits and indicators of compromise with expert Brad Duncan, gaining insights into cybersecurity threats and detection techniques.
via YouTube

2657 Courses


49 minutes

Optional upgrade avallable

Not Specified

Progress at your own speed

Conference Talk

Optional upgrade avallable

Overview

Explore exploit kits and indicators of compromise with expert Brad Duncan, gaining insights into cybersecurity threats and detection techniques.

Syllabus

  • Introduction to Exploit Kits
  • Definition and Purpose
    History and Evolution
    How Exploit Kits Work
  • Common Exploit Kits in Use
  • Overview of Popular Exploit Kits
    Case Studies of Notable Incidents
    Analysis of Current Trends
  • Indicators of Compromise (IoCs)
  • Definition and Importance
    Types of IoCs
    Gathering and Identifying IoCs
  • Techniques for Detecting Compromises
  • Tools and Technologies
    Best Practices for Monitoring and Detection
    Analysis of Network Traffic and Logs
  • Analysis of Exploit Kit Campaigns
  • Lifecycle of an Attack
    Understanding Payloads and Malicious Activity
    Case Studies and Real-World Examples
  • Mitigation and Response Strategies
  • Preventive Measures
    Incident Response Planning
    Recovery and Lessons Learned
  • Legal and Ethical Considerations
  • Laws Related to Cybersecurity
    Ethical Responsibilities in Handling IoCs
    Global Perspectives and Collaboration
  • Future of Exploit Kits and IoCs
  • Emerging Threats and Technologies
    Predictions and Preparing for the Future
    Advancing Detection Techniques
  • Conclusion and Key Takeaways
  • Summary of Important Concepts
    Final Q&A Session with Brad Duncan
  • Additional Resources
  • Recommended Readings
    Online Tools and Platforms
    Community and Networking Opportunities

Subjects

Conference Talks