October 2022
Intermediate to advanced
288 pages
8h 37m
English
This chapter covers
Expanding on the technical hacks and social engineering we discussed in chapters 4 and 5, this chapter looks at the next stage: what hackers do once they have broken their way inside your organization. We’ll also look at another common attack route: insider threats.
Back in chapter 2, we looked at the fundamental building blocks ...