{"id":490,"date":"2020-01-21T05:58:48","date_gmt":"2020-01-21T05:58:48","guid":{"rendered":"http:\/\/dcnds.asia\/?page_id=490"},"modified":"2020-01-21T05:58:48","modified_gmt":"2020-01-21T05:58:48","slug":"series-2-workshop-videos-in-malaysia","status":"publish","type":"page","link":"https:\/\/dcnds.iict.buet.ac.bd\/index.php\/series-2-workshop-videos-in-malaysia\/","title":{"rendered":"[Series 2] Workshop videos in Malaysia"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"MY2-D1S1   Introduction to Malware Botnets\" width=\"650\" height=\"366\" src=\"https:\/\/www.youtube.com\/embed\/R0fmSb_ByD4?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><figcaption><strong> MY2-D1S1 Introduction to Malware Botnets<\/strong> <br><\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"MY2-D1S2   Attack Vectors\" width=\"650\" height=\"366\" src=\"https:\/\/www.youtube.com\/embed\/AVdZL5ELClI?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><figcaption><strong> MY2-D1S2 Attack Vectors<\/strong> <\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"MY2-D1S3   Social Engineering and Botnet Proliferation\" width=\"650\" height=\"366\" src=\"https:\/\/www.youtube.com\/embed\/s_2Hv-pFneQ?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><figcaption> <strong>MY2-D1S3 Social Engineering and Botnet Proliferation<\/strong> <\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"MY2-D1S4   CESS for Malware Detection\" width=\"650\" height=\"366\" src=\"https:\/\/www.youtube.com\/embed\/75mOpy5BNwc?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><figcaption><strong> MY2-D1S4 CESS for Malware Detection<\/strong> <\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"MY2-D2S1   Network and Security Monitoring\" width=\"650\" height=\"366\" src=\"https:\/\/www.youtube.com\/embed\/dFNu4zcq48g?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><figcaption> <strong>MY2-D2S1 Network and Security Monitoring <\/strong> <\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"MY2-D2S2A   Botnet Monitoring\" width=\"650\" height=\"366\" src=\"https:\/\/www.youtube.com\/embed\/e97861eS5iE?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><figcaption><strong> MY2-D2S2A Botnet Monitoring<\/strong>   <\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"MY2-D2S2B   Botnet Detection and Monitoring Hands on\" width=\"650\" height=\"366\" src=\"https:\/\/www.youtube.com\/embed\/gzL3oFlFSac?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><figcaption> <strong>MY2-D2S2B Botnet Detection and Monitoring Hands on<\/strong>  <\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"MY2-D2S3   Case Study for IoT Botnet Mirai and Hands on\" width=\"650\" height=\"366\" src=\"https:\/\/www.youtube.com\/embed\/LQoF5K4dRR0?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><figcaption><strong> MY2-D2S3 Case Study for IoT Botnet Mirai and Hands on <\/strong>   <\/figcaption><\/figure>\n\n\n","protected":false},"excerpt":{"rendered":"<p>MY2-D1S1 Introduction to Malware Botnets MY2-D1S2 Attack Vectors MY2-D1S3 Social Engineering and Botnet Proliferation MY2-D1S4 CESS for Malware Detection MY2-D2S1 Network and Security Monitoring MY2-D2S2A Botnet Monitoring MY2-D2S2B Botnet Detection and Monitoring Hands on MY2-D2S3 Case Study for IoT Botnet Mirai and Hands on<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/dcnds.iict.buet.ac.bd\/index.php\/wp-json\/wp\/v2\/pages\/490"}],"collection":[{"href":"https:\/\/dcnds.iict.buet.ac.bd\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/dcnds.iict.buet.ac.bd\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/dcnds.iict.buet.ac.bd\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/dcnds.iict.buet.ac.bd\/index.php\/wp-json\/wp\/v2\/comments?post=490"}],"version-history":[{"count":1,"href":"https:\/\/dcnds.iict.buet.ac.bd\/index.php\/wp-json\/wp\/v2\/pages\/490\/revisions"}],"predecessor-version":[{"id":491,"href":"https:\/\/dcnds.iict.buet.ac.bd\/index.php\/wp-json\/wp\/v2\/pages\/490\/revisions\/491"}],"wp:attachment":[{"href":"https:\/\/dcnds.iict.buet.ac.bd\/index.php\/wp-json\/wp\/v2\/media?parent=490"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}