4. Payload Delivery
Lesson Description
This module will look at how payloads are delivered, and some of the methods that are used to exfiltrate information. The simulation covers an example of how a simple pivot network exploit works.
- Payload Delivery Methods
- Exfiltration
- Pivot Networks
Intended Audience
Although perceived as an IT issue, cyber security is, in fact, a subject relevant to all business units. Cyber Primer is aimed at anyone with an interest in cyber security, whether they are looking to pursue a career as a penetration tester, or just want to get a feel for the world of cyber security.
Prerequisites
There are no prerequisites for this lesson, however, participants are expected to have a basic understanding of computers and the internet.
Feedback
We welcome all feedback and suggestions - please contact us at qa.elearningadmin@qa.com to let us know what you think.