1 00:00:00,080 --> 00:00:02,389 Your networks are facing a constant 2 00:00:02,389 --> 00:00:04,129 barrage of attacks by malicious actors, 3 00:00:04,129 --> 00:00:07,399 hackers, hactivists, script kiddies, advanced 4 00:00:07,399 --> 00:00:09,380 persistent threats, and even nation 5 00:00:09,380 --> 00:00:11,030 states are all searching for foothold 6 00:00:11,030 --> 00:00:13,250 into networks around the globe. System 7 00:00:13,250 --> 00:00:14,750 administrators have always been the 8 00:00:14,750 --> 00:00:16,400 first line of defense and system 9 00:00:16,400 --> 00:00:18,830 security and in this global cyber war 10 00:00:18,830 --> 00:00:20,420 new role has become increasingly 11 00:00:20,420 --> 00:00:22,400 important to the security of our network 12 00:00:22,400 --> 00:00:25,519 as a linchpin to network defense it is 13 00:00:25,519 --> 00:00:27,349 imperative that system administrators 14 00:00:27,349 --> 00:00:29,269 understand the vulnerabilities and 15 00:00:29,269 --> 00:00:31,550 methodology employed by malicious cyber 16 00:00:31,550 --> 00:00:33,890 actors in order to assist in stopping 17 00:00:33,890 --> 00:00:36,860 cyber attacks in the anatomy of a cyber 18 00:00:36,860 --> 00:00:38,750 attack you will learn to dissect the 19 00:00:38,750 --> 00:00:40,370 techniques used by hackers and the 20 00:00:40,370 --> 00:00:42,800 regulation of a network from open source 21 00:00:42,800 --> 00:00:44,960 home search in reconnaissance to the 22 00:00:44,960 --> 00:00:46,460 exploitation and covering of their 23 00:00:46,460 --> 00:00:47,930 tracks you will learn hands-on 24 00:00:47,930 --> 00:00:49,850 techniques to probe your network for 25 00:00:49,850 --> 00:00:51,920 vulnerability and understand how they 26 00:00:51,920 --> 00:00:54,440 are exploited taught by an expert in 27 00:00:54,440 --> 00:00:56,450 cyber security you will learn to think 28 00:00:56,450 --> 00:00:58,370 like a hacker in order to thwart their 29 00:00:58,370 --> 00:01:00,500 future attacks on your network the 30 00:01:00,500 --> 00:01:02,450 anatomy of a cyber attack is essential 31 00:01:02,450 --> 00:01:03,920 to understanding the landscape of 32 00:01:03,920 --> 00:01:06,200 today's cyber threat a truly eye-opening 33 00:01:06,200 --> 00:01:08,180 experience into the world of cyber 34 00:01:08,180 --> 00:01:10,510 security 35 00:01:10,900 --> 00:01:12,960 you