0 1 00:00:00,000 --> 00:00:01,949 Welcome to The Anatomy of a Cyber Attack. 1 2 00:00:01,949 --> 00:00:03,929 My name is Jason Dion and I'm going to 2 3 00:00:03,929 --> 00:00:05,640 be your guide into the malicious mind of 3 4 00:00:05,640 --> 00:00:07,589 the cyber attacker. I'm going to show you 4 5 00:00:07,589 --> 00:00:09,750 the methodology, the tools, and techniques 5 6 00:00:09,750 --> 00:00:11,460 used in the exploitation of your 6 7 00:00:11,460 --> 00:00:13,410 networks and systems. This is going to be 7 8 00:00:13,410 --> 00:00:15,030 a great introduction to the importance 8 9 00:00:15,030 --> 00:00:16,440 of cybersecurity through both theory and 9 10 00:00:16,440 --> 00:00:18,600 hands-on examples. This course is 10 11 00:00:18,600 --> 00:00:20,250 designed for all IT personnel, and 11 12 00:00:20,250 --> 00:00:21,720 provides a great overview for the need 12 13 00:00:21,720 --> 00:00:23,220 of cybersecurity through hands-on 13 14 00:00:23,220 --> 00:00:24,900 examples of network and system 14 15 00:00:24,900 --> 00:00:27,060 exploitation. This course is designed to 15 16 00:00:27,060 --> 00:00:29,609 be fun, entertaining, and engaging. We're 16 17 00:00:29,609 --> 00:00:31,019 going to use Kali Linux, as our attack 17 18 00:00:31,019 --> 00:00:32,730 platform, which is a common choice among 18 19 00:00:32,730 --> 00:00:34,440 penetration testers, ethical hackers, and 19 20 00:00:34,440 --> 00:00:36,210 malicious actors. For our victim 20 21 00:00:36,210 --> 00:00:37,680 platforms, we're going to use Windows and 21 22 00:00:37,680 --> 00:00:39,360 Linux systems allowing us to understand 22 23 00:00:39,360 --> 00:00:40,590 the vulnerabilities of both of these 23 24 00:00:40,590 --> 00:00:42,660 operating environments. In order to keep 24 25 00:00:42,660 --> 00:00:44,070 our lab environments secure from the 25 26 00:00:44,070 --> 00:00:45,480 Internet and the Internet secure from us, 26 27 00:00:45,480 --> 00:00:47,579 we're going to use VirtualBox, a free 27 28 00:00:47,579 --> 00:00:49,200 virtualization software, in order to 28 29 00:00:49,200 --> 00:00:50,760 build our lab and keep all of the 29 30 00:00:50,760 --> 00:00:52,590 virtual machines in an isolated virtual 30 31 00:00:52,590 --> 00:00:54,390 network. We're going to cover a lot of 31 32 00:00:54,390 --> 00:00:56,190 ground throughout the course. For many, 32 33 00:00:56,190 --> 00:00:57,780 this will be your first exposure to the 33 34 00:00:57,780 --> 00:00:59,789 world of cyber security. For others, this 34 35 00:00:59,789 --> 00:01:01,260 may simply be a continuation of your 35 36 00:01:01,260 --> 00:01:03,750 previous IT experience. Regardless, I know 36 37 00:01:03,750 --> 00:01:05,430 everyone is going to learn something 37 38 00:01:05,430 --> 00:01:07,200 from this course as we dissect the 38 39 00:01:07,200 --> 00:01:10,790 threat in The Anatomy of a Cyber Attack.