Curriculum > Cyber Awareness > A Study in Breaches

A Study in Breaches


Tutorial Content

At a Glance

  • Information Security
  • Real-World Threats
  • 4 Case Studies

In this tutorial we use recent and applicable real-world examples of successful Information Security attacks to better understand not only the tactics used by genuine attackers, but also how to mitigate this particular set of risks.

“A real-world attack will often employ several malicious methods together.”

- Hut Six, A Study in Breaches

Learning Objectives

  • Reinforce Preceding Material
  • Understand Common Tactics
  • Risk Mitigation
  • Completion time: ~ 10 minutes

Tags

Related training