A Study in Breaches
Tutorial Content
At a Glance
- Information Security
- Real-World Threats
- 4 Case Studies
In this tutorial we use recent and applicable real-world examples of successful Information Security attacks to better understand not only the tactics used by genuine attackers, but also how to mitigate this particular set of risks.
“A real-world attack will often employ several malicious methods together.”
- Hut Six, A Study in Breaches
Learning Objectives
- Reinforce Preceding Material
- Understand Common Tactics
- Risk Mitigation
- Completion time: ~ 10 minutes