Using an Expanded Cyber Kill Chain Model to Increase Attack Resiliency

Using an Expanded Cyber Kill Chain Model to Increase Attack Resiliency

Black Hat via YouTube Direct link

Perimeter Breach Kill Chain

6 of 26

6 of 26

Perimeter Breach Kill Chain

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Using an Expanded Cyber Kill Chain Model to Increase Attack Resiliency

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Background
  3. 3 Purpose
  4. 4 Legacy Cyber Kill Chain
  5. 5 Legacy Cyber Kill Chain Critique
  6. 6 Perimeter Breach Kill Chain
  7. 7 Objectives
  8. 8 Expanded Cyber Kill Chain Model
  9. 9 Actions on Objectives
  10. 10 The De Loop
  11. 11 The Spiral
  12. 12 The Tree
  13. 13 Using The Model
  14. 14 Stage 2 Escalation
  15. 15 Stage 3 Lateral Movement
  16. 16 Stage 3 Reconnaissance
  17. 17 Stage 3 Exploitation
  18. 18 Stage 4 Weaponization
  19. 19 Stage 4 Installation
  20. 20 Stage 5 Execution
  21. 21 Resiliency
  22. 22 Example
  23. 23 Threshold of Defender Success
  24. 24 Shifting the Economic Model
  25. 25 Danger Zone and Safe Zone
  26. 26 Vertical vs Horizontal

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.