Course curriculum

    1. Intro-Intro Video to Course

    2. M1L1V1-Defining Cyber Espionage

    3. M1L1V2-APTs_ Stealth_ and Persistence

    4. M1L1V3-Threat Actor Classification

    1. M1L2V1 - State vs Non-State Actors

    2. M1L2V2_Financial_ Political _ Strategic Drivers

    3. M1L2V3 - Threat Profiling Demonstration

    1. M1L3V1-Evolution of Cyber Espionage

    2. M1L3V2- Major Global Incidents (e.g

    3. M1L3V3- Lessons Learned _ Patterns

    1. M2L1V1-Exfiltration Channels _ Techniques

    2. M2L1V2 Obfuscation Methods (Steganography_ Encryption)

    3. M2L1V3_Demo – Simulated Data Theft Using Tools

    1. M2L2V1 Payload Delivery Techniques

    2. M2L2V2 Lateral Movement via Credential Dumping

    3. M2L2V3_Demo – Malware Deployment Walkthrough

    1. M2l3v1 Passive vs Active Reconnaissance 

    2. M2L3V2_Exploitation Techniques _ Vulnerabilities

    3. M2L3V3-Social Engineering SimulationDemo- Nmap Active Reconnaissance

About this course

  • Free
  • 38 lessons
  • 5.5 hours of video content

Discover your potential, starting today