By Edraak
If you've ever studied famous fights in history, you'll know that no two are exactly the same. However, similar strategies and tactics are often used in battle because they have proven effective over time.
Likewise, when a criminal tries to hack into an organization, they will not reinvent the wheel unless they absolutely have the following: they will rely on common types of hacking techniques known to be very effective, such as malware, phishing, or cross-site scripting (XSS). Whether you are trying to understand the latest headlines of data breaches in the news or analyzing an incident in your organization, this helps to understand the various vectors of attack that a malicious actor may try to do harm. In this course, we'll talk about an overview of some of the most common types of attacks we see today.
In this course, we will talk about some of the most famous techniques used in cyber attack and penetration, which are:
1.Phishing
2.sniffing
3.SQL Injection
4.MITM
5.DDOS
6.Dnsmap
7.Routersploit