Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

IBM

Ethical Hacking War Stories - Zero Trust, IAM and Advanced C2 Tactics

IBM via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Dive into real-world ethical hacking scenarios through war stories shared by cybersecurity experts Jeff Crume and Patrick Fussell in this 15-minute video. Explore critical vulnerabilities in Zero Trust architectures and Identity and Access Management (IAM) systems while learning about advanced Command and Control (C2) attack tactics used by threat actors. Discover assume breach strategies that help organizations prepare for inevitable security incidents and understand lateral movement techniques that attackers use to escalate privileges and move through compromised networks. Gain practical insights into how ethical hackers identify and exploit security weaknesses to help organizations strengthen their cybersecurity posture. Learn defensive strategies and detection methods that can help protect against sophisticated attack vectors targeting modern enterprise environments.

Syllabus

Ethical Hacking War Stories: Zero Trust, IAM & Advanced C2 Tactics

Taught by

IBM Technology

Reviews

Start your review of Ethical Hacking War Stories - Zero Trust, IAM and Advanced C2 Tactics

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.