Devo Security Operations - Phishing Use Case

preview_player
Показать описание
Table of Contents:

00:00 - Introduction
00:10 - Phishing definition
00:28 - Phishing examples
00:46 - Use case: installing malware
01:38 - Use case procedure
02:18 - Detecting access to suspicious site
04:05 - Searching for recurrent accesses
05:41 - Searching for malware installations
06:36 - Further actions
Рекомендации по теме
Комментарии
Автор

Thanks very much sir. The Video was very impactful,

Paulo-wjmi