Module 5: Common Attack Techniques
Indicators of Compromise (IOC) and Cybersecurity Frameworks
Indicators of Compromise
Cybersecurity Frameworks
Opportunistic Attacks
Phishing and Credential Stealing
Ransomware
Denial of Service (DoS)
Automated Network Attacks
Targeted Attacks
Initial Access
C2 and Persistence
Lateral Movement
Domain Persistence
PreviousModule 4: Incident Response Communication PlansNextModule 6: Incident Detection and Identification
Last updated