The Hack Chain - Learn to think like a hacker
Provided by Nemstar Information Security
Description
Learn how nefarious actors gain access to your systems and data
"If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle."
― Sun Tzu, The Art of War
Sun Tzu's famous quote is highly relevant to cyber security. How can you defend from threats that you do not understand? How can you protect a network and systems you don't understand? This session will help understand the TTP's that hacker can deploy and hence gain a better understanding of how you can defend.
Outline
Level
Intermediate Technical
Courses that cover this topic in more detail
CEH, C|PENT, SOC, IH, CHFI
Similar courses
Learn how nefarious actors gain access to your systems and data
"If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle."
― Sun Tzu, The Art of War
Sun Tzu's famous quote is highly relevant to cyber security. How can you defend from threats that you do not understand? How can you protect a network and systems you don't understand? This session will help understand the TTP's that hacker can deploy and hence gain a better understanding of how you can defend.
Outline
Level
Intermediate Technical
Courses that cover this topic in more detail
CEH, C|PENT, SOC, IH, CHFI
Similar courses
Enquire
Start date | Location / delivery | |
---|---|---|
No fixed date | Live Online | Book now |