Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Cybersecurity Kill Chain™

via Cybrary

Description

A practical take on Lockheed Martin Cyber Kill Chain™, The course simulates an example target attack following the 7 phases of the Cyber Kill Chain™. Starting with reconnaissance utilizing online resources to research the target then use the information in weaponization and deliver to create a payload and deliver it to the target to exploit the target and install it and gain control on the target to action the objective of the attack. The course then utilizes the knowledge gained to design a defense in depth model using the Cyber Kill Chain™ to detect, deny, disrupt, degrade, deceive and contain the attack at each phase of the 7 phases of the Cyber Kill Chain™.

Tags

Syllabus

  • Module 1: Introduction and the Cyber Kill Chain Overview
    • 1.1 Introduction
    • 1.2 The Cyber Kill Chain
  • Module 2: The Cyber Kill Chain
    • 2.1 Reconnaissance 1
    • 2.2 Reconnaissance 2
    • 2.3 Reconnaissance 3
    • 2.4 Weaponization
    • 2.5 Delivery
    • 2.6 Exploitation and Installation
    • 2.7 Command and Control
    • 2.8 Action on Objectives
  • Module 3: Defense in Depth Using the Cyber Kill Chain
    • 3.1 Defense in Depth
  • Module 4: Conclusion
    • 4.1 Conclusion

Online Course


Cybersecurity Kill Chain™

via Cybrary
Affiliate notice

A practical take on Lockheed Martin Cyber Kill Chain™, The course simulates an example target attack following the 7 phases of the Cyber Kill Chain™. Starting with reconnaissance utilizing online resources to research the target then use the information in weaponization and deliver to create a payload and deliver it to the target to exploit the target and install it and gain control on the target to action the objective of the attack. The course then utilizes the knowledge gained to design a defense in depth model using the Cyber Kill Chain™ to detect, deny, disrupt, degrade, deceive and contain the attack at each phase of the 7 phases of the Cyber Kill Chain™.

  • Module 1: Introduction and the Cyber Kill Chain Overview
    • 1.1 Introduction
    • 1.2 The Cyber Kill Chain
  • Module 2: The Cyber Kill Chain
    • 2.1 Reconnaissance 1
    • 2.2 Reconnaissance 2
    • 2.3 Reconnaissance 3
    • 2.4 Weaponization
    • 2.5 Delivery
    • 2.6 Exploitation and Installation
    • 2.7 Command and Control
    • 2.8 Action on Objectives
  • Module 3: Defense in Depth Using the Cyber Kill Chain
    • 3.1 Defense in Depth
  • Module 4: Conclusion
    • 4.1 Conclusion