The Future of Data Exfiltration and Malicious Communication

The Future of Data Exfiltration and Malicious Communication

WEareTROOPERS via YouTube Direct link

Intro

1 of 20

1 of 20

Intro

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

The Future of Data Exfiltration and Malicious Communication

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Typical Techniques for Covert Channels
  3. 3 Shared Resource Matrix
  4. 4 Covert Flow Trees
  5. 5 Traffic Normalization
  6. 6 Other Approaches
  7. 7 Summary (pt. 1)
  8. 8 Protocol Channels & Protocol Hopping Covert Channels
  9. 9 Terminology
  10. 10 Combining Multiple Layers
  11. 11 Micro Prot. Engineering Approach
  12. 12 Status Update Approach
  13. 13 Example: Packet Forwarding
  14. 14 Requirements for CC Routing
  15. 15 Agents and Drones for Overlay Routing
  16. 16 Summary (pt. 2)
  17. 17 BACnet Protection
  18. 18 Introducing MLS using the Open Source BACnet Firewall Router
  19. 19 Summary (pt. 3)
  20. 20 Related Publications

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.