Home & Office
IT Dojo: Master the five phases of a successful network penetration [video]
Understanding how an enemy can penetrate your defenses is critical to effectively protecting your network. In this video, Bill Detwiler goes over the five phases of successful network penetration: Reconnaissance Scanning Gaining Access Maintaining Access Covering TracksHe also provides tips for defending against each type of attack.
![larry-dignan-eic.jpg](https://www.zdnet.com/a/img/resize/ad5eaccb545ef683588243a9891d5f678df042df/2017/04/26/eb462fe7-e39e-43ba-abbd-c4ca2442306e/larry-dignan-eic.jpg?auto=webp&fit=crop&frame=1&height=192&width=192)
Understanding how an enemy can penetrate your defenses is critical to effectively protecting your network. In this video, Bill Detwiler goes over the five phases of successful network penetration:
- Reconnaissance
- Scanning
- Gaining Access
- Maintaining Access
- Covering Tracks
He also provides tips for defending against each type of attack.
You can also read Tom Olzak’s article, “The five phases of a successful network penetration,” on which this video is based.
You can also sign up to receive the latest IT Dojo lessons through one or more of the following methods: