Using an Expanded Cyber Kill Chain Model to Increase Attack Resiliency

Using an Expanded Cyber Kill Chain Model to Increase Attack Resiliency

Black Hat via YouTube Direct link

Threshold of Defender Success

23 of 26

23 of 26

Threshold of Defender Success

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Using an Expanded Cyber Kill Chain Model to Increase Attack Resiliency

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Background
  3. 3 Purpose
  4. 4 Legacy Cyber Kill Chain
  5. 5 Legacy Cyber Kill Chain Critique
  6. 6 Perimeter Breach Kill Chain
  7. 7 Objectives
  8. 8 Expanded Cyber Kill Chain Model
  9. 9 Actions on Objectives
  10. 10 The De Loop
  11. 11 The Spiral
  12. 12 The Tree
  13. 13 Using The Model
  14. 14 Stage 2 Escalation
  15. 15 Stage 3 Lateral Movement
  16. 16 Stage 3 Reconnaissance
  17. 17 Stage 3 Exploitation
  18. 18 Stage 4 Weaponization
  19. 19 Stage 4 Installation
  20. 20 Stage 5 Execution
  21. 21 Resiliency
  22. 22 Example
  23. 23 Threshold of Defender Success
  24. 24 Shifting the Economic Model
  25. 25 Danger Zone and Safe Zone
  26. 26 Vertical vs Horizontal

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.