This course aims to teach participants how to transition from threat intelligence to creating rap sheets in a few steps. The course covers topics such as virus scanning, honeypots, phishing, passive DNS, system overview, data storage, graph data modeling, scaling up, IP distribution, malicious IP addresses by country, sandboxing, and identifying malicious activities. The teaching method involves hands-on talks, latest research, and practical insights from the INFOSEC field. The course is designed for decision-makers, security specialists, entrepreneurs, developers, and anyone interested in hacking and information security.
Overview
Syllabus
Intro
Virus Scanning
Honeypots
Phishing
Passive DNS
System Overview
System Facts
Why this model
Storage
Data Model
Why graph
Scaling up
Stats
IP Age Distribution
Malicious IP Addresses by Country
Question
Sandbox
Malicious
Taught by
DefCamp