Introduction, Sequence of a cyberattack, Recon phase, IP & Ports Scan, and vulnerabilities research, Exploitation of systems, Lateral movements, Privileges Escalation, Persistence, Network Sniffing, Detection of cyberattacks by signatures, Detection of cyberattacks by anomalies, Detection of cyberattacks using logs.