All in one sheet! This sheet shows:

  1. What is happening in the network.
  2. What type of attacks linger in between the layers.
  3. Plus, listed out are defense ideas, types of attacks, capture tools, hunting behaviors, and indicators of compromise.

This is a great resource for people who are making decisions but don’t have the time for a deep dive into security.

--

--

Jolie Curran

Jolie Curran

I make cybersecurity concepts relatable. So that people can understand, contribute, and achieve — igniting opportunity.