Part 2
IN THIS PART …
Get at overview of attack vectors and the different types of attack types as well as encryption and cryptology.
Learn about advanced persistent threats (APT) and how they lead to other assumption attacks, such as Man in the Middle (MiTM).
Discover how attackers can overwhelm and disrupt networks with Denial of Service (DoS) and distributed denial of service (DDoS) attacks.
Explore the various types of destroy attacks — those meant to destroy a company’s assets.
Go in depth with subvert attacks; they’re how hackers can sneak past controls undetected.
3.141.202.187