Tag: Security Best Practices

  • Phishing Skills

    My goal is to stay organized. So, here are the main learning objectives: familiarization of phishing attacks, identify various types of phishing attacks, and identify practical tools to assist in analyzing phishing attacks.

  • “Attack Targets on the Internet”

    There are script kiddies who succeed blindly and there are black hats who have larger fish to fry. This second chapter helps to draw a picture somewhere in the middle between the basement movie scene and the super-secret-squirrel black hat. Referencing the Lockheed Martin Cyber Kill Chain, there are 7 distinct steps a white hat,…