Network Compromise for the Technically Challenged (Dummies)
You can’t defend against what you don’t understand! To protect organizational assets from compromise you need to know how the attacker is going to act. This talk is intended to be a mostly non-technical talk that won’t show you how to do it but shows you how it’s done.
The seven steps covered are:
1. Reconnaissance
2. Scanning
3. Initial Point of Compromise
4. Lateral Movement
5. Data Exploitation
6. Creating Back Doors
7. Cleaning Up
Doc Blackburn has IT experience spanning four decades in application and software design and administration, server and network administration, cloud services and website development, along with security and compliance management and experience in several other technical disciplines. His interest in computers started in 1982 when he first started programming on the Texas Instruments TI-99 4a console, Bally Home Library Computer, and Commodore 64 systems and had continued as a dedicated computer hobbyist until he decided to make information technology a full-time career in 1998.
More on Doc: https://www.sans.org/profiles/doc-blackburn/
More on SANS SEC301: sans.org/sec301