Just Launched! New Course: Disrupting Cybercrime-as-a-Service: The Storm-1152 Story Here
Discover how automation and AI are ramping up the scale and efficiency of these attacks.
Enroll Now Share CourseGlen is the VP of IT and Security Engineering at Arkose Labs. While Arkose Labs is keeping it’s customers safe from bad guys, Glen and his team is keeping Arkose Labs safe from the bad guys while making sure everyone has the tools they need to get their job done efficiently.
Glen has spent a large portion of his career building efficient & effective teams. Notably building out the cloud API team at Halfbrick Studios and the backend API team at Console Connect. With his background in Software Engineering combined with over 7 years in the security industry gives him a great perspective for defending from attackers and working with everyone in the company to keep us all safer.
In his spare time Glen enjoys facilitating tech education by giving tech talks, running the CampJS coding retreat, building robots and the occasional security research.
Luke is a Lead Data Scientist at Arkose Labs. With over nine years of professional experience in data science and machine learning, he has contributed significantly to biometrics and security startups. At Arkose Labs he is on the Product Research Team focusing on enhancing data collection, analysis, and strengthening bot and fraud detection capabilities. Luke holds both a Master’s and Bachelor’s degree in Engineering from Wright State University.
Credential Stuffing
30 minutes
This introductory course is designed to give you an overview of one of the oldest yet still potent cyberthreats: credential stuffing.
While consumers often prioritize safeguarding their online bank account credentials, they tend to be less vigilant with account information in other industries, such as for social media platforms. Consequently, breaches that occur in one sector have a ripple effect across other industries as credential stuffing attacks serve as launching pads for further cybercrime.
This course will demystify the mechanics behind these attacks and examine the alarming statistics that reveal a staggering increase in credential stuffing attempts. Students will learn to identify red flags and explore advanced techniques to distinguish between legitimate users and automated bots. Real-world case studies provide a practical perspective on the impacts of credential stuffing.
After attending this course you’ll have actionable information that enables your company to identify and mitigate these attacks.
Any cyber pro who wants to sharpen their knowledge about this chronic attack.
Cybersecurity pros working at financial institutions, which are heavily targeted with credential stuffing attacks.
What are Credential Stuffing attacks + Demo
Red Flags Signaling Credential Stuffing
Attacker Motivation by the numbers + Case Studies
Test your course knowledge and answer these quick questions in order to earn a Badge!
To enroll in a course, simply click the course you’re interested in and follow the instructions.
No, courses are completely free and are offered to support your learning journey.
All courses are recorded and posted online, so you can participate when convenient for you.
After you complete the course, log into your student portal, where you can download a badge to share on LinkedIn or X.
Arkose Scraping Protection: Protect Digital Assets and Stop Automated Theft
|