Lessons
12+ Lessons | 36+ Exercises | 142+ Quizzes | 60+ Flashcards | 60+ Glossary of terms
TestPrep
Hand on lab
15+ LiveLab | 15+ Video tutorials | 30+ Minutes
Lessons 1: Introduction
- Who Is This Course For?
- What This Course Covers
Lessons 2: What Is the Attacker Mindset?
- Using the Mindset
- The Attacker and the Mindset
- AMs Is a Needed Set of Skills
- Summary
Lessons 3: Offensive vs. Defensive Attacker Mindset
- The Offensive Attacker Mindset
- Defensive Attacker Mindset
- Summary
Lessons 4: The Attacker Mindset Framework
- Development
- Ethics
- Social Engineering and Security
- Summary
Lessons 5: The Laws
- Law 1: Start with the End in Mind
- Law 2: Gather, Weaponize, and Leverage Information
- Law 3: Never Break Pretext
- Law 4: Every Move Made Benefits the Objective
- Summary
Lessons 6: Curiosity, Persistence, and Agility
- Curiosity
- The Exercise: Part 1
- The Exercise: Part 2
- Persistence
- Skills and Common Sense
- Summary
Lessons 7: Information Processing: Observation and Thinking Techniques
- Your Brain vs. Your Observation
- Observation vs. Heuristics
- Observation vs. Intuition
- Observing People
- Observation Exercise
- AMs and Observation
- Tying It All Together
- Critical and Nonlinear Thinking
- Vector vs. Arc
- Education and Critical Thinking
- Workplace Critical Thinking
- Critical Thinking and Other Psychological Constructs
- Nonlinear Thinking
- Tying Them Together
- Summary
Lessons 8: Information Processing in Practice
- Reconnaissance
- Recon: Passive
- Recon: Active
- OSINT
- Signal vs. Noise
- Summary
Lessons 9: Attack Strategy
- Attacks in Action
- Strategic Environment
- The Necessity of Engagement and Winning
- The Attack Surface
- AMs Applied to the Attack Vectors
- Summary
Lessons 10: Psychology in Attacks
- Setting The Scene: Why Psychology Matters
- Ego Suspension, Humility & Asking for Help
- Introducing the Target-Attacker Window Model
- Target Psychology
- Thin-Slice Assessments
- Default to Truth
- Summary
Lessons 11: Staying Protected—The Individual
- Attacker Mindset for Ordinary People
- Behavioral Security
- Amygdala Hijacking
- Analyze Your Attack Surface
- Summary
Lessons 12: Staying Protected—The Business
- Testing and Red Teams
- The Complex Policy
- Antifragile
- The Full Spectrum of Crises
- Final Thoughts
- Summary
Hands-on LAB Activities
What Is the Attacker Mindset?
- Exploiting a Website Using SQL Injection
Offensive vs. Defensive Attacker Mindset
- Using the NsLookup Tool
- Using theHarvester
The Attacker Mindset Framework
- Using a Social Engineering Technique
Information Processing in Practice
- Using Recon-ng
- Performing Passive Reconnaissance
- Performing Active Reconnaissance
- Using Maltego
- Displaying Metadata Information
Attack Strategy
- Using Anti-Phishing Tools
- Performing a Phishing Attack
Psychology in Attacks
- Gathering OSINT
- Performing a Spoofing Attack
Staying Protected—The Individual
- Creating a VPN Connection
- Analyzing Pwned Passwords
Reviews
There are no reviews yet.