Analysis of the Points of Entry to Your Infrastructure: Level Hard
In this training, we will analyze entry points in the infrastructure. We will talk about techniques used by attackers to obtain enough information to launch successful phishing attack. And later on we will also have a proper look at techniques used by modern malware to communicate with the C&C servers.
What you will learn
Topics covered:
1. Cyber Kill Chain and Mitre ATT&CK response
2. DNS
3. OSINT framework
4. TCP/IP Scanning
5. Phishing scenarios deepdive
6. Vulnerability scanning
7. RCE
8. C&C
What’s included
- Access to 2-hour recorded practical lesson including 5-phase analysis of phishing
- Training materials to download
- The virtual training covers: Cyber Kill Chain and Mitre ATT&CK response, DNS, OSINT framework, TCP/IP Scanning, Phishing scenarios and C&C.
- 12-month access to video recording and training materials for you to keep and get back to whenever needed.
Additional information
PLEASE NOTE: It may take 2-3 business days for your course access to be activated. You will receive an email from us with all necessary details.
Only registered users can write reviews. Please Sign in or create an account