In the new CCNA CyberSecurity Operations course you learn how to understand attack patterns and how to deal with it as a network defender. Only six steps are necessary to start malicious activity in which a command and control (C2) server is involved. In the image above you see a typical network attack in which a victim's computer is being compromized step by step.
Source
Chris Sanders, Security Onion 2016: The Investigators Labyrinth: A Data-Driven Perspective, 29:38
Published on Youtube 12 SEP 2016
URL: https://www.youtube.com/watch?v=nW9g2K69qOA
Comments