4. Payload Delivery

About

Lesson Description

This module will look at how payloads are delivered, and some of the methods that are used to exfiltrate information. The simulation covers an example of how a simple pivot network exploit works. 

  • Payload Delivery Methods  
  • Exfiltration  
  • Pivot Networks 

Intended Audience  

Although perceived as an IT issue, cyber security is, in fact, a subject relevant to all business units. Cyber Primer is aimed at anyone with an interest in cyber security, whether they are looking to pursue a career as a penetration tester, or just want to get a feel for the world of cyber security.  

Prerequisites

There are no prerequisites for this lesson, however, participants are expected to have a basic understanding of computers and the internet. 

Feedback 

We welcome all feedback and suggestions - please contact us at qa.elearningadmin@qa.com to let us know what you think.

Unit UUID
Course UUID
QA
This content is developed in partnership with QA
Learn more