Completed
Stage 3 Exploitation
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Using an Expanded Cyber Kill Chain Model to Increase Attack Resiliency
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Background
- 3 Purpose
- 4 Legacy Cyber Kill Chain
- 5 Legacy Cyber Kill Chain Critique
- 6 Perimeter Breach Kill Chain
- 7 Objectives
- 8 Expanded Cyber Kill Chain Model
- 9 Actions on Objectives
- 10 The De Loop
- 11 The Spiral
- 12 The Tree
- 13 Using The Model
- 14 Stage 2 Escalation
- 15 Stage 3 Lateral Movement
- 16 Stage 3 Reconnaissance
- 17 Stage 3 Exploitation
- 18 Stage 4 Weaponization
- 19 Stage 4 Installation
- 20 Stage 5 Execution
- 21 Resiliency
- 22 Example
- 23 Threshold of Defender Success
- 24 Shifting the Economic Model
- 25 Danger Zone and Safe Zone
- 26 Vertical vs Horizontal