13 分鐘

S2E9 Cyber Security Offensive Actions Cyber Security Grey Beard®

    • 事業

NOTE: THIS INFORMATION IS FOR EDUCATIONAL PURPOSES ONLY!  I DO NOT CONDONE OR ENDORSE USING THIS INFORMATION FOR ILLEGAL OR NEFARIOUS PURPOSES.
 Ethical hacking discussion on offensive actions.  I go through standard hacker methodology and actions performed in a breach.  I mention jobs associated with these skills and discuss defensive mechanism in association with these offensive actions.
 Thank you Cloud Academy (https://cloudacademy.com) for sponsoring this episode
Lockheed Martin Kill Chain:  https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html
Certified Ethical Hacker: https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/


 
Support the show

NOTE: THIS INFORMATION IS FOR EDUCATIONAL PURPOSES ONLY!  I DO NOT CONDONE OR ENDORSE USING THIS INFORMATION FOR ILLEGAL OR NEFARIOUS PURPOSES.
 Ethical hacking discussion on offensive actions.  I go through standard hacker methodology and actions performed in a breach.  I mention jobs associated with these skills and discuss defensive mechanism in association with these offensive actions.
 Thank you Cloud Academy (https://cloudacademy.com) for sponsoring this episode
Lockheed Martin Kill Chain:  https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html
Certified Ethical Hacker: https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/


 
Support the show

13 分鐘