Topics We Will Cover:
Cyber Stalking: how attackers gathers and analyzes information about the target during the stalking phase.
Scanning: how attackers utilizes the port and vulnerability scanners against the target and analyzes the targets exposure to the Internet.
Social Engineering: How attackers seek to influence people and how easy it is to find information about their targets.
Securing The Organization: How can you protect yourselves and the
organizations they work for against modern cyber threats.