Bad, Good, and Best Password Practices: Preventing Dictionary-Based Attacks – Part 2

Password Security Best Practices

Date: January 19, 2024
Time: 1:30 PM WET | 8:30 AM EST |7:00 PM IST
Topic: Bad, Good, and Best Password Practices: Preventing Dictionary-Based Attacks – Part 2
Watch Now

Abstract: Dictionary-based attacks pose a persistent threat in the digital realm, persisting as long as there is a need for more emphasis on secure password practices and awareness. These attacks involve automated attempts to guess passwords by leveraging essential yet crucial information until the correct one is discovered. Contemporary password strategies focus on increasing the complexity of brute force and dictionary attacks. This includes utilizing custom dictionaries for filtering specific terms, developing resilient rainbow tables, and enforcing agile and stringent password creation, storage, and security protocols. The current webinar aims to explore elements for security stakeholders to create and manage secure passwords, encompassing practical hashing algorithms for securing and managing rainbow tables. The webinar also delves into the implementation of robust password policies.
Key takeaways:

  • Impact of dictionary-based attacks on the current digital landscape
  • Overview of password security and management policies
  • Role of custom dictionary in password security management
  • Importance of rainbow tables and its functioning
  • Guide to implementing effective password policies

Speaker:

Sergey Chubarov Sergey Chubarov, Security Expert

Bio:
Sergey Chubarov is a security and cloud expert and instructor with more than 15 years of experience in Microsoft technologies.

His day-to-day job is to help companies securely embrace cloud technologies. He has certifications and recognitions such as Microsoft MVP: Security, OSCP, OSEP, eCPPT, eCPTX, Microsoft Certified Trainer, MCT Regional Lead, EC-Council’s C|EH, C|PENT, L|PT, C|CSE, C|EI, CREST C|PSA, C|RT and more.

Sergey often speaks at local and international conferences like Global Azure, DEF CON, Black Hat Europe, Wild West Hackin’ Fest, Security BSides, Workplace Ninja, Midwest Management Summit, Hack in the Box, etc.

*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)


Share this post

Recent Posts

INQUIRE NOW

Related Posts

Are you looking to pursue a career in cybersecurity?

Unlock Your Cyber Security Potential at EC-Council University