Рет қаралды 3,844
In this video walk-through, we covered the first part of Tempest challenge which is about analyzing and responding to an cyber incident from the compromised machine. You are tasked to conduct an investigation from a workstation affected by a full attack chain.
*************
Receive Cyber Security Field Notes and Special Training Videos
/ @motasemhamdan
*******
Instagram
/ dev.stuxnet
Twitter
/ manmotasem
Facebook
/ motasemhamdantty
LinkedIn
[1]: / motasem-hamdan-7673289b
[2]: / motasem-eldad-ha-bb424...
Website
www.motasem-no...
Patreon
www.patreon.co...
Backup channel
/ @themastermindclips
My Movie channel:
/ channel
******