
Project Ares Enterprise + Cyber Threats Bundle
$898.00
{{option.name}}:
{{selected_options[option.position]}}
{{value_obj.value}}
Project Ares Enterprise Bundle Virtual Courses & Labs Adversaries and targets Motivations and Techniques The Adversary Model (resources, capabilities, intent, motivation, risk aversion, access) Types of Attacks Password guessing / cracking Backdoors / Trojans / viruses / wireless attacks Sniffing / spoofing / session hijacking Denial of service / distributed DOS / BOTs MAC spoofing / web app attacks / 0-day exploits And the vulnerabilities that enable them Attack Timing (within x minutes of being attached to the net) Social Engineering Events that indicate an attack is/has happened Legal Issues Attack surfaces / vectors Attack trees Insider problem Covert Channels Threat Information Sources (e.g., CERT)
Show More
Show Less