Training agenda
- Cyber attack lifecycle
- Cyber0Kill chain
- MITRE ATT&CK framework
- Attacks and threats (exploitation, defense, case studies)
- Ransomware
- Malware
- Denial of Service / Distributed Denial of Service
- Phishing
- Supply-chain attack
- Zero-days
- Web application vulnerabilities (SQL Injection, Cross-site Scripting)
- Data Leaks
- Mass account takeover
- Data manipulation
- Advanced Persistence Threat (Backdoor)
- Cyber hygiene