Companies Home Search Profile

BotNet BootCamp - Types, Architectures, Attacks and Defense

Focused View

Michael Goedeker

3:31:12

131 View
  • 1. Introduction to BotNets.mp4
    20:54
  • 2. Structure of a BotNet.mp4
    23:05
  • 3.1 D2.6 DOMINOES Deliverable Design-and-Implementation.pdf
  • 3.2 Political Propagation of Social Botnets Policy Con.pdf
  • 3. Types of BotNets.mp4
    31:53
  • 4.1 Additional Website for BYOB.html
  • 4.2 Github Resources for BYOB.html
  • 4. Creating a BotNet.mp4
    12:31
  • 5. BotNet Eco Systems.mp4
    14:47
  • 6.1 BotClouds and BaaS.html
  • 6.2 sigcomm poster.pdf
  • 6. BaaS (BotNet as a Service).mp4
    24:14
  • 7. Attack Vectors of BotNets.mp4
    23:22
  • 8. Administration of BotNets.mp4
    15:13
  • 9. Ways to Detect BotNet Clients.mp4
    28:55
  • 10. Defense Against BotNets.mp4
    11:08
  • 11. Summary.mp4
    04:27
  • 1.1 8TowardsSocialBotnetBehaviorDetectingintheEndHost ICPADS2014.pdf
  • 1.2 applsci-11-05713-v2.pdf
  • 1.3 Internet service providers responsibilities in bot.pdf
  • 1.4 Investigationofpeer-to-peerbotnetusingTCP.pdf
  • 1.5 jcp-02-00006.pdf
  • 1.6 usenixsecurity17 slides ma zane.pdf
  • 1. References.mp4
    00:43
  • 2. Handbook.html
  • 1. Download the Arm VM to build your own Botnet Virtual Lab..html
  • Description


    Introduction about the components, types and operations of BotNets.

    What You'll Learn?


    • Discuss what a BotNet is.
    • Discuss the components that make up a BotNet
    • Understand how BotNets work and infect clients, IoT and other devices
    • Understand how to detect BotNets
    • How to build a Botnet for your Virtual Lab

    Who is this for?


  • People interested or involved in IT Security or Cyber Security
  • People Interested in IT Forensics and Cyber Espionage, War and Crime attack tools
  • People interested in understanding Botnets and other security threats when using the Internet or any computer
  • Red, Blue and Rainbow Team Members that want some more hands on experience with Botnets, Detection and Analysis
  • More details


    Description

    In recent years, the international order from the Ukraine to the United States has been seriously impacted by botnets, the remotely controlled networks of computers with nefarious intentions. The virus, ransomware, and disruptive services offered by various botnets have a variety of unique consequences and characteristics.

    Therefore, strengthening the defenses against them is crucial. To more or less successfully combat botnets, one should examine their code, communication, kill chain, and other technological characteristics. However, the Business Model for Information Security asserts that in addition to technology characteristics, their skills and behavior also have a human and organizational component.

    The purpose of this course is to describe the elements of various attacks and to give a framework for analysing the technical and human characteristics of botnets. Five botnet attacks were used as case studies for testing the specified framework. ElectrumDoSMiner, Emote, Gamover Zeus, Mirani, and VPNFilter were the botnets that were selected. The comparison concentrated on the following factors: motivation, the used business model, cooperation readiness, capabilities, and attack source. Due to the dynamic behavior of cyberspace and botnets, it is difficult for defending organizations to achieve the target level of defending capabilities with a one-time development. The methods described in this research should be used to construct cyber defense and gather threat intelligence on botnets. According to the BMIS paradigm, this framework combines human and technology characteristics, giving the defender a uniform classification system.


    This is a beginners course that is aimed at explaining what BotNets are, how they are built and operated. It also discusses how BotNets attack and have avoided detection in the past by Anti Virus solutions. This course starts with the basics then moves on to more details and then finally shows examples of BotNets and how to detect if clients are infected with BotNet clients.

    After the course you will be able to:

    1. Explain what a BotNet is

    2. Explain and describe the components and architecture of BotNets

    3. Explain the ecosystem of BotNets

    4. Explain BaaS (BotNet as a Service)

    5. Explain different types of BotNets

    6. Explain the difference between SocialBots and "normal" BotNets

    7. Discover infected clients that are part of a BotNet

    8. Understand different types of attacks that BotNets can do

    This course is meant to give any student that takes it critical knowledge and skills to understand the unique threats that BotNets pose to an entity.

    Who this course is for:

    • People interested or involved in IT Security or Cyber Security
    • People Interested in IT Forensics and Cyber Espionage, War and Crime attack tools
    • People interested in understanding Botnets and other security threats when using the Internet or any computer
    • Red, Blue and Rainbow Team Members that want some more hands on experience with Botnets, Detection and Analysis

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Michael Goedeker
    Michael Goedeker
    Instructor's Courses
    Hi, my name is Mike and I have been working in the IT and Security space for more than 30 years. As a result of this long time in the security and technology industry I have amassed more than 15 separate certifications ranging from CISSP to more specific ones like SIEM Engineer. My academic life has seen multiple degrees and research as well from the apprenticeship all the way up to Doctoral Research for Heriot Watt University in Edinburgh and my Masters at Ulster University in Ireland. I am an author of 5 books in English and 3 in German as well as multiple articles, reports and papers on topics ranging from Cyberbullying in Social Networks up to and including Nation State Cyber Warfare and Espionage. Health-wise I have completed my Trainer Certification as well as Meditation, Fitness Instructor and also Tai-Chi Qi Gong training for relaxation, anti stress and other forms of holistic health practices. My specialities are Security, Cybersecurity, Cyber Risk, Intelligence, IT Technologies, Stress, Risk Management, Business Leadership, Business Management / Economics, Doctoral Research, and Holistic Health.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 12
    • duration 3:31:12
    • Release Date 2023/05/18