The Cyber Kill Chain

The Cyber Kill Chain model was developed by Lockheed Martin to describe the process cyber criminals use to target their victims in pursuit of profit.  The process involves 7 stages from reconnaissance to action on objectives.

The Cyber Kill Chain Stages

The research, identification and selection of targets.

Preparing and delivering malware (viruses, worms, Trojan horses, ransomware, spyware etc.) into a deliverable payload for delivery to the target.

Transmission of weapon i.e. malware or ransomware to the target via email attachments, websites, USB drives, etc.

Using a vulnerability in the target system to execute code.

Installing malware on computer devices from a remote location.

The establishment of remote command and control to manipulate victims.

Where cyber criminals use hands-on keyboard access to accomplish their goals from a remote location.

Watch the video

Take the Quiz

The NIST Cybersecurity Framework is a set of guidelines for mitigating organisational cybersecurity risks produced by the US National Institute of Standards and Technology (NIST).  Learn more…

Tactical defence and offence tools

Below are some of the tools covered on our 12-week introduction to cybersecurity and computer systems administration.

Metasploit is a penetration testing framework which is a collaboration between the open source community and Rapid7, Metasploit helps security teams do more than just verify vulnerabilities, manage security assessments, and improve security awareness; it empowers and arms defenders to always stay one step (or two) ahead of the game.  Learn more…

Kali Linux is a suite of open-source tools geared towards various information security tasks, such as Penetration Testing, Security Research, Computer Forensics and Reverse Engineering. Learn more…

CompTIA Security+ Certification

Today, there is a global shortage of cybersecurity practitioners as evidenced by the findings from the UK and US reports below.

Cyber security skills in the UK labour market 2021.

US Bureau of Labor Statistics: Occupational Outlook Handbook, Information Security Analysts

Access to a challenging and rewarding opportunity in cyber security can be achieved through obtaining the knowledge skills and abilities through hands-on training provided by our 12-week intensive course.

At the end of the course, participants can enter for the CompTIA certification: CompTIA Security+

If you would like to learn more about our training courses and CompTIA certification, please contact us using the form below.