Threat Actor’s Use of Publicly Available Information

Course Title: Threat Actor's Use of Publicly Available Information

Session(s): 5 Sessions

Class Time: 8:30AM-4:30PM

Course Overview:

Hacking always commences with reconnaissance, searching and sorting through any available information on the target. In the age of the internet, a lot of that information is freely accessible. It includes information from public sources such as conventional media (newspapers, magazines), web-based communities and social media, public/official data, and professional/academic publications. It is important to understand what information is available to a Threat Actor and how it can be used to develop an attack.

Prerequisites: