The Art of Attack: Attacker Mindset for Security Professionals
(ATK-MINDSEC.AE1)
/ ISBN: 978-1-64459-406-3
This course includes
Lessons
TestPrep
LiveLab
Mentoring (Add-on)
The Art of Attack: Attacker Mindset for Security Professionals
Lessons
-
12+ Lessons
-
36+ Exercises
-
142+ Quizzes
-
60+ Flashcards
-
60+ Glossary of terms
TestPrep
LiveLab
-
15+ LiveLab
-
15+ Video tutorials
-
30+ Minutes
- Who Is This Course For?
- What This Course Covers
- Using the Mindset
- The Attacker and the Mindset
- AMs Is a Needed Set of Skills
- Summary
- The Offensive Attacker Mindset
- Defensive Attacker Mindset
- Summary
- Development
- Ethics
- Social Engineering and Security
- Summary
- Law 1: Start with the End in Mind
- Law 2: Gather, Weaponize, and Leverage Information
- Law 3: Never Break Pretext
- Law 4: Every Move Made Benefits the Objective
- Summary
- Curiosity
- The Exercise: Part 1
- The Exercise: Part 2
- Persistence
- Skills and Common Sense
- Summary
- Your Brain vs. Your Observation
- Observation vs. Heuristics
- Observation vs. Intuition
- Observing People
- Observation Exercise
- AMs and Observation
- Tying It All Together
- Critical and Nonlinear Thinking
- Vector vs. Arc
- Education and Critical Thinking
- Workplace Critical Thinking
- Critical Thinking and Other Psychological Constructs
- Nonlinear Thinking
- Tying Them Together
- Summary
- Reconnaissance
- Recon: Passive
- Recon: Active
- OSINT
- Signal vs. Noise
- Summary
- Attacks in Action
- Strategic Environment
- The Necessity of Engagement and Winning
- The Attack Surface
- AMs Applied to the Attack Vectors
- Summary
- Setting The Scene: Why Psychology Matters
- Ego Suspension, Humility & Asking for Help
- Introducing the Target-Attacker Window Model
- Target Psychology
- Thin-Slice Assessments
- Default to Truth
- Summary
- Attacker Mindset for Ordinary People
- Behavioral Security
- Amygdala Hijacking
- Analyze Your Attack Surface
- Summary
- Testing and Red Teams
- The Complex Policy
- Antifragile
- The Full Spectrum of Crises
- Final Thoughts
- Summary
Hands on Activities (Live Labs)
- Exploiting a Website Using SQL Injection
- Using the NsLookup Tool
- Using theHarvester
- Using a Social Engineering Technique
- Using Recon-ng
- Performing Passive Reconnaissance
- Performing Active Reconnaissance
- Using Maltego
- Displaying Metadata Information
- Using Anti-Phishing Tools
- Performing a Phishing Attack
- Gathering OSINT
- Performing a Spoofing Attack
- Creating a VPN Connection
- Analyzing Pwned Passwords
×