Skip to content

Details

  • Understanding and performing recon on the target network using port scanning tools.
  • Identifying potential and critical targets to exploit.
  • Connecting the dots to complete the attack chain: Exploiting DNS.
  • Detecting such attacks using a holistic SIEM solution.

Related topics

Network Security
System Administration
Information Security
ITIL ITSM
Help Desk

You may also like