Video: Master the five phases of a successful network penetration

Understanding how an enemy can penetrate your defenses is critical to effectively protecting your network. In this video, Bill Detwiler discusses the five phases of successful network penetration and covers ways to defend against each type of attack.

IT Dojo: The five phases of a successful network penetration Understanding how an enemy can penetrate your defenses is critical to effectively protecting your network. In this video, Bill Detwiler discusses the five phases of successful network penetration and covers ways to defend against each type of attack. Once you’ve watched this IT Dojo video, you can find a link to the original TechRepublic article and print the tip from our <a href="http://blogs.techrepublic.com.com/itdojo/?p=464">IT Dojo Blog</a>.

Understanding how an enemy can penetrate your defenses is critical to effectively protecting your network. In this video, I go over the five phases of successful network penetration:

  • Reconnaissance
  • Scanning
  • Gaining Access
  • Maintaining Access
  • Covering Tracks

I also provide tips for defending against each type of attack.

For those of you who prefer text to video, you can click the Transcript link that appears below the video player window or you can also read Tom Olzak's article, "The five phases of a successful network penetration," on which this video is based.

You can also sign up to receive the latest IT Dojo lessons through one or more of the following methods: