Introduction, Sequence of a cyberattack, Recon phase, IP & Ports Scan, and vulnerabilities research, Exploitation of systems, Lateral movements, Privileges Escalation, Persistence, Network Sniffing, Detection of cyberattacks by signatures, Detection of cyberattacks by anomalies, Detection of cyberattacks using logs.
- Enseignant (éditeur): Charbel Akiki
- Enseignant (éditeur): Ahmed Techini