Gain a Splash of New Skills - Coursera+ Annual Nearly 45% Off
Master AI & Data—50% Off Udacity (Code CC50)
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Dive into real-world ethical hacking scenarios through war stories shared by cybersecurity experts Jeff Crume and Patrick Fussell in this 15-minute video. Explore critical vulnerabilities in Zero Trust architectures and Identity and Access Management (IAM) systems while learning about advanced Command and Control (C2) attack tactics used by threat actors. Discover assume breach strategies that help organizations prepare for inevitable security incidents and understand lateral movement techniques that attackers use to escalate privileges and move through compromised networks. Gain practical insights into how ethical hackers identify and exploit security weaknesses to help organizations strengthen their cybersecurity posture. Learn defensive strategies and detection methods that can help protect against sophisticated attack vectors targeting modern enterprise environments.
Syllabus
Ethical Hacking War Stories: Zero Trust, IAM & Advanced C2 Tactics
Taught by
IBM Technology