Cyber Attack Stages

Foundation-Cyber Attack Stages

Current Status
Not Enrolled
Get Started

Course Description

The Cyberattack stages make the Kill Chain model for describing the steps an attacker must complete carrying a successful attack. In this course, we’ll look at defensive tools we can apply at every phase of the kill chain as part of a multi-layered security strategy.

Topics Covered

  • Reconnaissance
  • Scanning
  • Enumeration
  • Gaining access
  • Escalation of privileges
  • Maintaining access
  • Network exploitation
  • Covering tracks