A very high level overview of how the Internet functions as well as the primary components that make up the Internet.
This module will also touch on some of the different security devices that exist in modern enterprise networks outlining their purpose and the way attackers try to take advantage of them.
Symantec cyber war games 2014
Overview of the first phase of an attack, Reconnaissance. The reconnaissance stage is where the adversary leverages information from a variety of factors to understand their target.
Examines the use of John the Ripper for cracking passwords, using NetCat to transfer files and Dig to perform DNS queries.