![](https://ccweb.imgix.net/https%3A%2F%2Fwww.classcentral.com%2Fimages%2Ficon-black-friday.png?auto=format&ixlib=php-4.1.0&s=fe56b83c82babb2f8fce47a2aed2f85d)
Overview
![](https://ccweb.imgix.net/https%3A%2F%2Fwww.classcentral.com%2Fimages%2Ficon-black-friday.png?auto=format&ixlib=php-4.1.0&s=fe56b83c82babb2f8fce47a2aed2f85d)
This course covers topics such as data breach announcements, defense in depth, social engineering, password spraying, remote admin tools, identity management tools, hash attacks, system hardening processes, and open source intelligence gathering. The course aims to teach learners how to enhance their cybersecurity skills and knowledge through practical examples and discussions. The intended audience for this course is individuals interested in cybersecurity, particularly those looking to improve their understanding of cybersecurity tools and techniques.
Syllabus
Intro
How do we get ahead
Data breach announcements
Defense in depth
Social engineering
The 8step process
Password spraying
Remote admin tools
Impact
Identity Management Tools
Hash Attack
Small Business Perspective
The Tech Even Thinks
Oversimplifying the Process
Do you follow documented system hardening processes
Answer yes to everything in this list
Step 1 Gathering Open Source Intelligence
Have an Open Honest Conversation
Looking Ahead
The Tool
Conclusion