WEBVTT

00:00.000 --> 00:01.230
>> Hey guys, welcome to

00:01.230 --> 00:03.210
the Cyber Kill Chain
course on Cybrary.

00:03.210 --> 00:04.260
This is Abdulrahman Alnaim.

00:04.260 --> 00:06.090
Today, we're going to
introduce the course.

00:06.090 --> 00:08.580
But first let me start
by introducing myself.

00:08.580 --> 00:10.740
My name is Abdulrahman
Alnaim and I

00:10.740 --> 00:13.455
hold a bachelor's degree
in Computer Science.

00:13.455 --> 00:16.035
My experience is mostly in
cybersecurity includes

00:16.035 --> 00:19.575
penetration testing,
cybersecurity architecture,

00:19.575 --> 00:22.530
governance risk and
compliance, access management,

00:22.530 --> 00:24.165
and I'm currently working as

00:24.165 --> 00:27.060
a security engineer
supporting security systems.

00:27.060 --> 00:30.450
I hold a number of
certificates including CISSP,

00:30.450 --> 00:31.830
CISM, and CRISC.

00:31.830 --> 00:36.180
If you are wondering if I
got my CISSP by connecting

00:36.180 --> 00:41.295
the CISSP book to my head
using the USB cable,

00:41.295 --> 00:43.310
actually that did not really

00:43.310 --> 00:45.665
work and you have
to study for it.

00:45.665 --> 00:48.170
However, Cybrary has
a great CISSP course

00:48.170 --> 00:50.220
that I highly recommend.

00:50.420 --> 00:52.910
The target audience for

00:52.910 --> 00:54.950
this course are
computer science and

00:54.950 --> 00:57.170
cybersecurity
students looking to

00:57.170 --> 00:59.240
gain real world knowledge.

00:59.240 --> 01:02.870
Also career professionals
looking to make the jump into

01:02.870 --> 01:07.590
cybersecurity would benefit
a lot from this course.

01:07.590 --> 01:09.510
The best way to protect from

01:09.510 --> 01:11.415
a hacker is to think
like a hacker,

01:11.415 --> 01:14.165
and this is the intention
of this course,

01:14.165 --> 01:16.415
is to show you how hackers work.

01:16.415 --> 01:18.350
Hopefully, at the end
we'll show you how to

01:18.350 --> 01:21.620
protect from these attacks.

01:21.620 --> 01:23.540
Finally, engineers looking to

01:23.540 --> 01:25.580
improve their
understanding of security,

01:25.580 --> 01:27.920
I promise you if you go
through this course,

01:27.920 --> 01:30.890
>> at the end, your
next conversation with

01:30.890 --> 01:33.870
>> the security team
will be a lot easier.

01:33.870 --> 01:36.590
The prerequisite for this
course is basic knowledge in

01:36.590 --> 01:39.440
cybersecurity
attacks, Kali Linux.

01:39.440 --> 01:42.320
If you are planning on
following with the labs,

01:42.320 --> 01:44.960
you need to install Kali
Linux on your machine.

01:44.960 --> 01:46.880
If you go to the resources page,

01:46.880 --> 01:48.980
you'll find an additional
readings links

01:48.980 --> 01:52.545
to Kali Linux virtual machine.

01:52.545 --> 01:54.170
You also need
Internet connection,

01:54.170 --> 01:56.540
which I assume you
already have as you

01:56.540 --> 02:00.580
are viewing this course.

02:00.580 --> 02:03.300
Let's start with
pre-assessment course.

02:03.300 --> 02:05.450
This will help us determine

02:05.450 --> 02:06.750
the knowledge that
we gain at the end.

02:06.750 --> 02:07.880
We're going to go through the

02:07.880 --> 02:10.610
>> same questions at the end.

02:10.610 --> 02:12.440
>> I'm not going to give you
the answers now, however,

02:12.440 --> 02:13.640
throughout the
course I hope that

02:13.640 --> 02:15.080
you remember these questions.

02:15.080 --> 02:16.280
The first thing is,

02:16.280 --> 02:18.395
what is the cyber kill chain?

02:18.395 --> 02:20.960
Second is what are
the seven steps of

02:20.960 --> 02:23.555
the Lockheed Martin
cyber kill chain?

02:23.555 --> 02:27.920
What steps in the kill chain
are passive and active?

02:27.920 --> 02:30.320
Finally, how do we use
the cyber kill chain in

02:30.320 --> 02:33.370
designing a defense
in depth model?

02:33.370 --> 02:37.340
The learning objectives of
this course is to introduce

02:37.340 --> 02:39.615
the Lockheed Martin's
cyber kill chain

02:39.615 --> 02:42.810
and share the steps of
that cyber kill chain.

02:42.810 --> 02:45.460
It's a number of steps that
we're going to learn about.

02:45.460 --> 02:49.120
Go through each and
every step and then go

02:49.120 --> 02:51.205
through designing
a defense in depth

02:51.205 --> 02:54.130
using the cyber
kill chain model.

02:54.130 --> 02:57.640
I've added some
additional readings

02:57.640 --> 03:00.260
in the available
resources links to

03:00.260 --> 03:04.630
almost all of the tools that we

03:04.630 --> 03:07.525
use during the course and

03:07.525 --> 03:11.810
additional readings that
you might find interesting.

03:12.110 --> 03:15.100
Just a disclaimer, the
cyber kill chain is

03:15.100 --> 03:17.200
a trademark of Lockheed Martin.

03:17.200 --> 03:19.390
The usage of the cyber
kill chain in this course

03:19.390 --> 03:21.980
is intended for
educational purposes.

03:21.980 --> 03:24.050
As I said, Lockheed Martin

03:24.050 --> 03:26.420
did a great job in
the cyber kill chain.

03:26.420 --> 03:30.230
It's the best way to

03:30.230 --> 03:33.695
teach how hackers attempt
a targeted attack,

03:33.695 --> 03:35.285
is using that kill chain.

03:35.285 --> 03:38.674
A lot of times

03:38.674 --> 03:41.420
courses tend to use
the cyber kill chain

03:41.420 --> 03:44.515
for that educational purpose.

03:44.515 --> 03:47.360
In the next video, we're
going to start the course.

03:47.360 --> 03:49.790
We're going to jump into
the cyber kill chain

03:49.790 --> 03:53.520
and introduce the cyber
kill chain. See you then.

