Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Behaviors and Patterns of Bulletproof and Anonymous Hosting Providers - USENIX Enigma Conference - 2017

USENIX Enigma Conference via YouTube

Overview

Limited-Time Offer: Up to 75% Off Coursera Plus!
7000+ certificate courses from Google, Microsoft, IBM, and many more.
The course aims to educate participants on the behaviors and patterns of bulletproof and anonymous hosting providers, which are crucial for ransomware, phishing, and cybercrime operations. Participants will learn about the technology used by these hosting providers, how to detect threats, identify relevant features, understand tax havens and payment methods, and navigate the jurisdictional complexities involved. The teaching method involves presenting research findings on criminal hosting in the Dutch IP space. The course is intended for threat analysts, security researchers, and law enforcement professionals looking to enhance their understanding of illegal and malicious content on the Internet.

Syllabus

Introduction
Hosting Provider Technology
Outline
Threat Detection Model
Identifying Relevant Features
Tax Havens
Payment Methods
The Netherlands
Abuse complaints
Challenges
Evidence
Jurisdictional Complexity
Business Perspective
What can we do
Conclusion

Taught by

USENIX Enigma Conference

Reviews

Start your review of Behaviors and Patterns of Bulletproof and Anonymous Hosting Providers - USENIX Enigma Conference - 2017

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.