Day 3.
What's the ultimate goal of the cyber kill chain?
- Install new device to protect the network
- Produce documentation of a possible vuln
- Identify and mitigate vulns before attack
- 5 stages of an malicious attack
Enter your E-mail address. We'll send you an e-mail with instructions to reset your password.