X
Home & Office

IT Dojo: Master the five phases of a successful network penetration [video]

Understanding how an enemy can penetrate your defenses is critical to effectively protecting your network. In this video, Bill Detwiler goes over the five phases of successful network penetration: Reconnaissance Scanning Gaining Access Maintaining Access Covering TracksHe also provides tips for defending against each type of attack.
Written by Larry Dignan, Contributor

Understanding how an enemy can penetrate your defenses is critical to effectively protecting your network. In this video, Bill Detwiler goes over the five phases of successful network penetration:

  • Reconnaissance
  • Scanning
  • Gaining Access
  • Maintaining Access
  • Covering Tracks

He also provides tips for defending against each type of attack.

You can also read Tom Olzak’s article, “The five phases of a successful network penetration,” on which this video is based.

You can also sign up to receive the latest IT Dojo lessons through one or more of the following methods:

Editorial standards