Module 2: Attacker Methodology Introduction
The Network as a Whole
The DMZ

Deployment Environments

Core and Edge Network Devices

Virtual Private Networks and Remote Sites

The Lockheed-Martin Cyber Kill-Chain
The Importance of the Kill-Chain
Case Study 1: Monero Cryptomining
Case Study 2: Petya, Mischa, and GoldenEye
MITRE ATT&CK Framework
Tactics, Techniques, and Sub-Techniques
Case Study 1: OilRig
Case Study 2: APT3
Case Study 3: APT28
Last updated
