Premium Features

Previous Buy now to get complete version Next
  • Home
uCertify Logo
  • login
  • Signup
    • Help & Support
    • Accessibility
    • Testimonials
  • Hello GuestLogin or Signup
  • Feedback & Support
    • Support
    • Keyboard Shortcuts
    • Send Feedback
Scroll to top button

The Art of Attack: Attacker Mindset for Security Professionals

(ATK-MINDSEC.AE1) / ISBN: 978-1-64459-406-3
This course includes
Lessons
TestPrep
LiveLab
Mentoring (Add-on)
GVZFSERVUYM03IU0_pro.png?1659090082 GVZFSERVUYM03IU0_pro.png?1659090082
Try this course Pre-Assessment and first two Lessons free No credit card required
Are you an instructor? Teach using uCertify products
Request a free evaluation copy

The Art of Attack: Attacker Mindset for Security Professionals

Here's what you will get

Lessons
  • 12+ Lessons
  • 36+ Exercises
  • 142+ Quizzes
  • 60+ Flashcards
  • 60+ Glossary of terms
TestPrep
LiveLab
  • 15+ LiveLab
  • 15+ Video tutorials
  • 30+ Minutes
Here's what you will learn
Download Course Outline
Lesson 1: Introduction
  • Who Is This Course For?
  • What This Course Covers
Lesson 2: What Is the Attacker Mindset?
  • Using the Mindset
  • The Attacker and the Mindset
  • AMs Is a Needed Set of Skills
  • Summary
Lesson 3: Offensive vs. Defensive Attacker Mindset
  • The Offensive Attacker Mindset
  • Defensive Attacker Mindset
  • Summary
Lesson 4: The Attacker Mindset Framework
  • Development
  • Ethics
  • Social Engineering and Security
  • Summary
Lesson 5: The Laws
  • Law 1: Start with the End in Mind
  • Law 2: Gather, Weaponize, and Leverage Information
  • Law 3: Never Break Pretext
  • Law 4: Every Move Made Benefits the Objective
  • Summary
Lesson 6: Curiosity, Persistence, and Agility
  • Curiosity
  • The Exercise: Part 1
  • The Exercise: Part 2
  • Persistence
  • Skills and Common Sense
  • Summary
Lesson 7: Information Processing: Observation and Thinking Techniques
  • Your Brain vs. Your Observation
  • Observation vs. Heuristics
  • Observation vs. Intuition
  • Observing People
  • Observation Exercise
  • AMs and Observation
  • Tying It All Together
  • Critical and Nonlinear Thinking
  • Vector vs. Arc
  • Education and Critical Thinking
  • Workplace Critical Thinking
  • Critical Thinking and Other Psychological Constructs
  • Nonlinear Thinking
  • Tying Them Together
  • Summary
Lesson 8: Information Processing in Practice
  • Reconnaissance
  • Recon: Passive
  • Recon: Active
  • OSINT
  • Signal vs. Noise
  • Summary
Lesson 9: Attack Strategy
  • Attacks in Action
  • Strategic Environment
  • The Necessity of Engagement and Winning
  • The Attack Surface
  • AMs Applied to the Attack Vectors
  • Summary
Lesson 10: Psychology in Attacks
  • Setting The Scene: Why Psychology Matters
  • Ego Suspension, Humility & Asking for Help
  • Introducing the Target-Attacker Window Model
  • Target Psychology
  • Thin-Slice Assessments
  • Default to Truth
  • Summary
Lesson 11: Staying Protected—The Individual
  • Attacker Mindset for Ordinary People
  • Behavioral Security
  • Amygdala Hijacking
  • Analyze Your Attack Surface
  • Summary
Lesson 12: Staying Protected—The Business
  • Testing and Red Teams
  • The Complex Policy
  • Antifragile
  • The Full Spectrum of Crises
  • Final Thoughts
  • Summary

Hands on Activities (Live Labs)

What Is the Attacker Mindset?

  • Exploiting a Website Using SQL Injection

Offensive vs. Defensive Attacker Mindset

  • Using the NsLookup Tool
  • Using theHarvester

The Attacker Mindset Framework

  • Using a Social Engineering Technique

Information Processing in Practice

  • Using Recon-ng
  • Performing Passive Reconnaissance
  • Performing Active Reconnaissance
  • Using Maltego
  • Displaying Metadata Information

Attack Strategy

  • Using Anti-Phishing Tools
  • Performing a Phishing Attack

Psychology in Attacks

  • Gathering OSINT
  • Performing a Spoofing Attack

Staying Protected—The Individual

  • Creating a VPN Connection
  • Analyzing Pwned Passwords
×
uc logo for app downloadDownload our uCertify App [lms_setting_placeholder: This filed is used to set the LMS settings.

Share with your friends and colleagues

We use cookies to enhance your experience. By continuing to visit this site you agree to our use of cookies. More information
Accept