Lesson 2
Lesson 2: Threat Types
Core Concepts
Vulnerability: Weakness in a system (unpatched software)Threat: Potential danger (hacker exploiting vulnerability)Risk: Impact × Likelihood of threat occurring
Threat Actor Attributes
Classification:
Internal/External: Authorized users vs outsidersSophistication: Low (script kiddies) vs High (nation-states)Resources: Organized crime (funded) vs hacktivists (ideological)
Motivations:
- Financial: Ransomware, fraud
- Political: Espionage (APT groups)
- Chaotic: Hacktivists (Anonymous)
- Accidental: Insider mistakes
Key Threat Actor Types
Hacktivists
- Ideologically motivated
- Tactics: DDoS attacks, website defacement, data leaks
- Low-budget, volunteer efforts
- Public operations, claim responsibility
Nation-State Actors
- Government-sponsored
- Tactics: Zero-day exploits, APTs, supply chain attacks
- Advanced, stealthy, well-funded
- Avoid attribution, long-term access
- Examples: APT29 (Russian Cozy Bear), APT41 (China)
Organized Crime
- Profit-driven
- Tactics: Ransomware, phishing, cryptojacking
- Financial gain and extortion
Insiders
- Malicious: Revenge, sabotage, data theft
- Negligent: Accidental breaches, shadow IT
Attack Surfaces and Vectors
Attack Surface Components:
Physical: Unsecured server roomsNetwork: Open ports, weak credentialsHuman: Social engineeringSoftware: Zero-day vulnerabilities
Network-Based Vectors:
- Exploits targeting protocols (Bluetooth, DNS, HTTP)
- Misconfigurations (unsecured cloud storage, default credentials)
- MITM attacks (intercepting unencrypted traffic)
- DoS/DDoS (overwhelming with traffic)
Lure-Based Vectors:
- Malicious USB drops
- Trojanized software (fake downloads)
- Malicious documents (Office files with macros)
- Image/PDF exploits
Message-Based Vectors:
Phishing: Fraudulent emails (fake login pages)SMiShing/Vishing: SMS/voice scams- Social media scams
BEC (Business Email Compromise): Impersonating executives
Supply Chain Vectors:
- Compromised software updates (SolarWinds)
- Third-party access exploitation
- Hardware tampering
MITRE ATT&CK Framework
Tactics: Initial access, lateral movement, exfiltrationTechniques: Spear phishing (T1566), credential dumping (T1003)
Social Engineering Techniques
Core methods:
Phishing: Fake emailsVishing/SMiShing: Voice calls/text scamsPretexting: Fabricated scenariosBEC: CEO fraud
Human Psychological Vectors:
Impersonation: Posing as IT staff/vendorsUrgency: Creating time pressure ("account deleted in 24 hours")Authority: Exploiting hierarchical obedience (CEO requesting transfer)Familiarity: Using shared interests or casual toneConsensus: "Everyone already did this"Social Proof: Showing fake testimonials or endorsements
All Content
Lesson 0: Study Tips and Resources
Study Tips and Resources
Lesson 1: Fundamental Security Concepts
Study Tips and Resources
Lesson 3: Cryptographic Solutions
Study Tips and Resources
Lesson 4: Identity and Access Management (IAM)
Study Tips and Resources
Lesson 5: Enterprise Network Architecture
Study Tips and Resources
Lesson 6: Cloud & Zero Trust
Study Tips and Resources
esson 7: Resiliency and Site Security
Study Tips and Resources
Lesson 8: Vulnerability Management
Study Tips and Resources
Lesson 9: Network Security Capabilities
Study Tips and Resources
Lesson 10: Endpoint Security
Study Tips and Resources
Lesson 11: Application Security
Study Tips and Resources
Lesson 12: Alerting and Monitoring
Study Tips and Resources
Lesson 13: Analyze Indicators of Malicious Activity
Study Tips and Resources
Lesson 14: Security Governance Concepts
Study Tips and Resources
Lesson 15: Risk Management Processes
Study Tips and Resources
Lesson 16: Data Protection and Compliance Concepts
Study Tips and Resources