Тёмный

The Cyber Kill Chain 

Sunny Classroom
Подписаться 236 тыс.
Просмотров 35 тыс.
50% 1

Today my topic is the Cyber Kill Chain, a seven-stage cyberattack process, and a defense model used for the identification and prevention of cyber-attacks on a computer network.
Playlists:
Cyber Attacks and Defense
• AAA framework: TACACS+...
Basic Cryptography
• Private Key Encryption...
Advanced Cryptography:
• What is digital signat...
Public Key Infrastructure
• Why digital certificate?
Remote Access & WAN Technologies
• Circuit Switching vs. ...

Опубликовано:

 

24 июл 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 39   
@StefSharkySchultz
@StefSharkySchultz Год назад
THIS VIDEO IS AWESOME. Favorite explanation I've come across and beautifully done! Thank you so much, sir. :)
@TerriMarieReh
@TerriMarieReh 7 месяцев назад
I used this to teach my middle school computer science class. They all understood the kill chain when we finished. Thank you for excellent work.
@accumulator4825
@accumulator4825 2 года назад
Great explanation and beautiful animations and infographics imo. Thank you!
@ajbrown3608
@ajbrown3608 2 года назад
As always, another great video from Sunny!
@user-ib4bg9kg5s
@user-ib4bg9kg5s 3 года назад
Thank you Sunny, a very informative video.
@DankHD1080p
@DankHD1080p 3 года назад
More cybersecurity Sunny!
@paticruz3992
@paticruz3992 3 месяца назад
Sunny, thank you for making this video. It was so easy to understand!
@pablocasanova9200
@pablocasanova9200 3 года назад
Excelent! Very clear Sunny!!!
@funkykong9001
@funkykong9001 3 года назад
Great explanation! Thank you!
@marcosalameh8677
@marcosalameh8677 3 года назад
As usual so wonderful!!!!!!!!
@fyks6447
@fyks6447 Год назад
Straight forward and no BS!
@supplychainlogisticstv
@supplychainlogisticstv 27 дней назад
This is a nice video on cyber kill chain. Some similarities with supply chain management. Hope similar videos will publish more.
@phephedwiputra3785
@phephedwiputra3785 3 года назад
Thank you sunny
@marcosalameh8677
@marcosalameh8677 2 года назад
Wonderful!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
@syohm7782
@syohm7782 3 года назад
Thanks Sunny!
@privateness.network
@privateness.network 3 года назад
tremendous work sansei you have more students than you know
@ibnyassin
@ibnyassin 11 месяцев назад
so informational thanks for your effort,appreciated.
@martyb3783
@martyb3783 3 года назад
Very informative. Thanks.
@itseric5117
@itseric5117 3 года назад
Look forward to your cyber security series
@criptovida
@criptovida 9 месяцев назад
Simple explanation as usual. Thanks for sharing.
@Ngonie_3
@Ngonie_3 Год назад
5:46 Attackers have to be right only once, and protectors have to be right all the time.
@ShahrinRahman
@ShahrinRahman 2 года назад
Well explained. Thank you.
@prathapn8762
@prathapn8762 Год назад
Great explanation 🎉
@bit_happens_
@bit_happens_ 3 года назад
Thank you!
@vigneshramesh5453
@vigneshramesh5453 2 года назад
Great work I am a fan of your presentation what more cyber security videos
@auntieegg8
@auntieegg8 Год назад
Thank you 🙏☺️🙌
@rastafadev
@rastafadev Год назад
Thank you Sir
@Sudhakar-Kakinada
@Sudhakar-Kakinada 2 года назад
Too Good 👍
@eastwest1970
@eastwest1970 3 года назад
Thank you
@abudi88ful
@abudi88ful 2 года назад
very good video
@prraneth0576
@prraneth0576 2 года назад
Please update the video about mitre attack framework🙏
@kanwaljeetsingh4783
@kanwaljeetsingh4783 3 года назад
Nice Video Sunny ! Do you mind sharing icon and animation resources you use ?
@sunnyclassroom24
@sunnyclassroom24 2 года назад
I use flash .
@sunnyclassroom24
@sunnyclassroom24 2 года назад
I use flash .
@sunnyclassroom24
@sunnyclassroom24 2 года назад
I use flash .
@sunnyclassroom24
@sunnyclassroom24 2 года назад
I use flash .
@ankit7319
@ankit7319 3 года назад
Sunny buoy
@omarelzanary4443
@omarelzanary4443 Год назад
thanks i send you a dog as a present
@sirorco1
@sirorco1 3 года назад
Thank you !
Далее
Breaking Cyber Kill Chain
4:47
Просмотров 10 тыс.
Breaking The Kill Chain: A Defensive Approach
13:18
Просмотров 157 тыс.
Телеграмм-Колян Карелия #юмор
00:10
Я читаю переписки сына
00:18
Просмотров 628 тыс.
Crossing the Most Dangerous Crosswalk
00:24
Просмотров 11 млн
ATT&CK Matrix: The Enemies Playbook
14:04
Просмотров 49 тыс.
Secret of subnet mask
8:53
Просмотров 296 тыс.
The 6 most common types of phishing attacks
7:02
Просмотров 26 тыс.
Diamond Model of Intrusion Analysis - An Overview
9:56
Kerberos - authentication protocol
6:08
Просмотров 487 тыс.
SOC 101: Real-time Incident Response Walkthrough
12:30
Просмотров 194 тыс.
Tricks to hack hashed passwords
6:53
Просмотров 101 тыс.