Ethical Hacking War Stories - Zero Trust, IAM and Advanced C2 Tactics
Learn Excel & Financial Modeling the Way Finance Teams Actually Use Them
Learn AI, Data Science & Business — Earn Certificates That Get You Hired
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Dive into real-world ethical hacking scenarios through war stories shared by cybersecurity experts Jeff Crume and Patrick Fussell in this 15-minute video. Explore critical vulnerabilities in Zero Trust architectures and Identity and Access Management (IAM) systems while learning about advanced Command and Control (C2) attack tactics used by threat actors. Discover assume breach strategies that help organizations prepare for inevitable security incidents and understand lateral movement techniques that attackers use to escalate privileges and move through compromised networks. Gain practical insights into how ethical hackers identify and exploit security weaknesses to help organizations strengthen their cybersecurity posture. Learn defensive strategies and detection methods that can help protect against sophisticated attack vectors targeting modern enterprise environments.
Syllabus
Ethical Hacking War Stories: Zero Trust, IAM & Advanced C2 Tactics
Taught by
IBM Technology