
Wait a minute..
In this course, participants will be invited to follow the attack process built by the attackers in an effort to understand the flow of the attack process in a computer security incident.
In this course, participants will be invited to follow the attack
process built by the attackers in an effort to understand the flow of the attack
process in a computer security incident. By understanding how an attacker
performs an attack, participants will be able to build a process of attack
pattern analysis aimed at finding the origin of an attack. Based on these
activities, participants can prevent or predict the next attack pattern.
Write a public review