Video Description

This lesson opens with an definition of Active Defenses. Essentially, active defenses apply decoys, attacker time wasters and honeypot-related activities to code and not 'hacking back." These defenses can actually warn and trigger alarms which allow an incident response team to actually see who is trying to access their information and possibly thwart an attack. Actives defenses need to be an integral part of organizations which are advanced and security mature. Participants also receive a small sample of the following tools: HoneyBadger JAR Combiner Web_bug.doc Spidertrap Design: Honeytable

Course Modules

Secure Coding