Training agenda
  1. Cyber attack lifecycle
    • Cyber0Kill chain
    • MITRE ATT&CK framework
  2. Attacks and threats (exploitation, defense, case studies)
    • Ransomware
    • Malware
    • Denial of Service / Distributed Denial of Service
    • Phishing
    • Supply-chain attack
    • Zero-days
    • Web application vulnerabilities (SQL Injection, Cross-site Scripting)
    • Data Leaks
    • Mass account takeover
    • Data manipulation
    • Advanced Persistence Threat (Backdoor)
  3. Cyber hygiene