CISSP Study Group.com

Breaches, Vulnerabilities, and CISSP Defenses


Listen Later

An in-depth analysis of modern hacking methodsand their implications for CISSP security domains. It examines various high-profile cyber incidents, categorizing them by attack vectors such as supply chain compromises (e.g., SolarWinds, Kaseya), zero-day exploits (e.g., Exchange ProxyLogon, Log4j), managed file transfer breaches (e.g., MOVEit), and ransomware attacks on critical infrastructure (e.g., Colonial Pipeline). The document also highlights the enduring threat of social engineering and credential theft. For each incident, it breaks down attacker tactics, techniques, and procedures (TTPs), linking them directly to relevant CISSP principles and mitigation strategies, emphasizing the importance of defense in depth and robust incident response.

...more
View all episodesView all episodes
Download on the App Store

CISSP Study Group.comBy Vincent Primiani