This FAQ, collaboratively created by the community, addresses the contents of the course titled “Cyber Kill Chain”.
This course includes these lessons:
- Introduction to Cyber Kill Chain
- Cyber Kill Chain Steps
- Reconnaissance
- Weaponization
- Delivery
- Exploitation
- Installation
- Command and Control (C2)
- Actions on Objectives
You can locate this exercise within the LetsDefend content: