From the course: Ethical Hacking: Introduction to Ethical Hacking

Unlock the full course today

Join today to access over 23,200 courses taught by industry experts.

Challenge: The cyber kill chain

Challenge: The cyber kill chain

- [Instructor] Let's do a challenge. In this three-part challenge, we'll review the cyber kill chain, the concept of an advanced persistent threat and a case study that steps through an attack. You can find the links and the questions in the challenge worksheet, but let's review the details so that you can get started. First, you'll go to this site and read the article and then answer the following, what is the cyber kill chain? List the main steps. Next, go to Lockheed Martin and scroll down and provide an expanded definition of an advanced persistent threat. Finally, you'll go to this site and then download this case study, which is a forensic exercise where they piece together the activities that led to this type of an attack. You'll go to page five and list the phases of this attack along with a few tactics, techniques and procedures in each phase. So pause the video and complete the challenge and then come back and…

Contents