CCNA Cyber Ops – 6.0 Attack Methods
This is the last of a series of posts about the CCNA Cyber Ops certification, you can find the fifth part here. 6.1 Compare and contrast an attack surface and vulnerability: The attack surface of a software environment is the sum of the different points (the “attack vectors”) where an unauthorized user (the “attacker”) can… Continue reading CCNA Cyber Ops – 6.0 Attack Methods