The Art of Attack: Attacker Mindset for Security Professionals

(ATK-MINDSEC.AE1)/ISBN:978-1-64459-406-3

This course includes
Lessons
TestPrep
Hand-on Lab
AI Tutor (Add-on)

The Art of Attack: Attacker Mindset for Security Professionals course is designed to equip security professionals with the fundamentals of the attacker mindset, including reconnaissance, scanning, enumeration, and exploitation. The course covers a range of topics, including the attacker mindset, reconnaissance techniques, scanning and enumeration techniques, exploitation techniques, and more. With interactive lessons, hands-on labs, and real-world projects, learners will gain practical experience and confidence in identifying and mitigating cybersecurity threats.

Lessons

12+ Lessons | 36+ Exercises | 142+ Quizzes | 60+ Flashcards | 60+ Glossary of terms

TestPrep

Hand on lab

15+ LiveLab | 15+ Video tutorials | 30+ Minutes

Here's what you will learn

Download Course Outline

Lessons 1: Introduction

  • Who Is This Course For?
  • What This Course Covers

Lessons 2: What Is the Attacker Mindset?

  • Using the Mindset
  • The Attacker and the Mindset
  • AMs Is a Needed Set of Skills
  • Summary

Lessons 3: Offensive vs. Defensive Attacker Mindset

  • The Offensive Attacker Mindset
  • Defensive Attacker Mindset
  • Summary

Lessons 4: The Attacker Mindset Framework

  • Development
  • Ethics
  • Social Engineering and Security
  • Summary

Lessons 5: The Laws

  • Law 1: Start with the End in Mind
  • Law 2: Gather, Weaponize, and Leverage Information
  • Law 3: Never Break Pretext
  • Law 4: Every Move Made Benefits the Objective
  • Summary

Lessons 6: Curiosity, Persistence, and Agility

  • Curiosity
  • The Exercise: Part 1
  • The Exercise: Part 2
  • Persistence
  • Skills and Common Sense
  • Summary

Lessons 7: Information Processing: Observation and Thinking Techniques

  • Your Brain vs. Your Observation
  • Observation vs. Heuristics
  • Observation vs. Intuition
  • Observing People
  • Observation Exercise
  • AMs and Observation
  • Tying It All Together
  • Critical and Nonlinear Thinking
  • Vector vs. Arc
  • Education and Critical Thinking
  • Workplace Critical Thinking
  • Critical Thinking and Other Psychological Constructs
  • Nonlinear Thinking
  • Tying Them Together
  • Summary

Lessons 8: Information Processing in Practice

  • Reconnaissance
  • Recon: Passive
  • Recon: Active
  • OSINT
  • Signal vs. Noise
  • Summary

Lessons 9: Attack Strategy

  • Attacks in Action
  • Strategic Environment
  • The Necessity of Engagement and Winning
  • The Attack Surface
  • AMs Applied to the Attack Vectors
  • Summary

Lessons 10: Psychology in Attacks

  • Setting The Scene: Why Psychology Matters
  • Ego Suspension, Humility & Asking for Help
  • Introducing the Target-Attacker Window Model
  • Target Psychology
  • Thin-Slice Assessments
  • Default to Truth
  • Summary

Lessons 11: Staying Protected—The Individual

  • Attacker Mindset for Ordinary People
  • Behavioral Security
  • Amygdala Hijacking
  • Analyze Your Attack Surface
  • Summary

Lessons 12: Staying Protected—The Business

  • Testing and Red Teams
  • The Complex Policy
  • Antifragile
  • The Full Spectrum of Crises
  • Final Thoughts
  • Summary

Hands-on LAB Activities

What Is the Attacker Mindset?

  • Exploiting a Website Using SQL Injection

Offensive vs. Defensive Attacker Mindset

  • Using the NsLookup Tool
  • Using theHarvester

The Attacker Mindset Framework

  • Using a Social Engineering Technique

Information Processing in Practice

  • Using Recon-ng
  • Performing Passive Reconnaissance
  • Performing Active Reconnaissance
  • Using Maltego
  • Displaying Metadata Information

Attack Strategy

  • Using Anti-Phishing Tools
  • Performing a Phishing Attack

Psychology in Attacks

  • Gathering OSINT
  • Performing a Spoofing Attack

Staying Protected—The Individual

  • Creating a VPN Connection
  • Analyzing Pwned Passwords