Free

Cybersecurity Kill Chain™

Learn a foundational concept within cybersecurity in this Cybersecurity Kill Chain™ course. This course simulates an example attack and exposes the 7 phases of the Lockheed Martin Cyber Kill Chain™. Then you’ll apply the knowledge gained to design a defense-in-depth model to defend against the attack.
1
41
M
Time
beginner
difficulty
2
ceu/cpe

Course Content

4.1 Conclusion

6m

Module 4: Conclusion
1.1 Introduction

4m

Module 1: Introduction and the Cyber Kill Chain Overview
2.1 Reconnaissance 1

16m

Module 2: The Cyber Kill Chain
3.1 Defense in Depth

7m

Module 3: Defense in Depth Using the Cyber Kill Chain
1.2 The Cyber Kill Chain

7m

Module 1: Introduction and the Cyber Kill Chain Overview
2.2 Reconnaissance 2

10m

Module 2: The Cyber Kill Chain
2.3 Reconnaissance 3

10m

Module 2: The Cyber Kill Chain
2.4 Weaponization

8m

Module 2: The Cyber Kill Chain
2.5 Delivery

8m

Module 2: The Cyber Kill Chain
2.6 Exploitation and Installation

8m

Module 2: The Cyber Kill Chain
2.7 Command and Control

8m

Module 2: The Cyber Kill Chain
2.8 Action on Objectives

9m

Module 2: The Cyber Kill Chain
Course Description

A practical take on Lockheed Martin Cyber Kill Chain™, The course simulates an example target attack following the 7 phases of the Cyber Kill Chain™. Starting with reconnaissance utilizing online resources to research the target then use the information in weaponization and deliver to create a payload and deliver it to the target to exploit the target and install it and gain control on the target to action the objective of the attack. The course then utilizes the knowledge gained to design a defense in depth model using the Cyber Kill Chain™ to detect, deny, disrupt, degrade, deceive and contain the attack at each phase of the 7 phases of the Cyber Kill Chain™.

This course is part of a Career Path:
No items found.

Instructed by

Instructor
Abdulrahman Alnaim

My name is Abdulrahman “Abdul” Alnaim, I hold a bachelor’s degree in Computer Science from the American University, Washington, D.C. Over my tenure in Cybersecurity I was heavily involved in Awareness, Behavior Management and Cybersecurity Training. I moved to working in Security Operations then penetration testing and applications security. After that I worked in Governance Risk and Compliance. I currently work as Security Operations Manager in-charge of overseeing security monitoring, digital forensics and incident response along with other operations such as vulnerability management and penetration testing.

Cybrary is one of the best resources I use to learn and remain on-top of current technologies in Cybersecurity. I think its only fair to give back to Cybrary community by sharing my experience and knowledge for others to gain the required knowledge to excel in Cybersecurity.

Provider
Cybrary Logo
Certification Body
Certificate of Completion

Complete this entire course to earn a Cybersecurity Kill Chain™ Certificate of Completion