Key Tactics and Techniques to Hack to Defend
Social Engineering
Open Source Intelligence (OSINT)
Supply Chain Attacks
Footprinting & Reconnaissance
Vulnerability Scanning
Phishing & Spear Phishing
Encryption and Ransomware
AI & LLM Attacks
Denial of Service Attacks (DoS)
Man in the Middle (MitM) Attacks
Cross Site Scripting (XSS) Attacks
SQL Injection Attacks
Session Hijacking
Zero Day Exploits Attacks