English Cybersecurity – Episode 7
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.
Add to basket failed.
Please try again later
Add to Wish List failed.
Please try again later
Remove from Wish List failed.
Please try again later
Follow podcast failed
Unfollow podcast failed
-
Narrated by:
-
By:
About this listen
- Threat Actor Types:
- Script kiddies, criminal organizations, hacktivists, insiders
- Nation-state actors (APT groups) – motivations and tactics
- Case studies of evolving threats:
- From basic phishing → sophisticated spear phishing
- From simple ransomware → double extortion models
- Emerging threat vectors:
- Deepfakes for social engineering
- Supply chain attacks (e.g., SolarWinds)
- AI-powered malware and automation
- 7 stages of an attack:
- Reconnaissance
- Weaponization
- Delivery
- Exploitation
- Installation
- Command & Control (C2)
- Actions on Objectives
- How defenders can “break the chain” at each stage
- What is ATT&CK and why it’s useful
- Tactics vs. Techniques vs. Procedures (TTPs)
- Brief demo (or screenshots) of MITRE ATT&CK Navigator
- How blue teams use it for threat detection
- Mapping common attacks to ATT&CK
No reviews yet
In the spirit of reconciliation, Audible acknowledges the Traditional Custodians of country throughout Australia and their connections to land, sea and community. We pay our respect to their elders past and present and extend that respect to all Aboriginal and Torres Strait Islander peoples today.