Common Attack Types (Phishing, Malware, Ransomware, DDoS)
Overview
from Como, which is mainly radios, to Windows 3.11, to creating networks, to creating emails, to using your Windows 95 disk to set up everything, to spear phishing emails, starting to attacks, to, what was it, the Mozilla browser? To what it is right now. So I was able to see a lot of it. Question, I mean, Curtis said, I just wanna say you are the modern day, what? Okay, yeah, yeah, yeah, okay.
Okay, Kurt. I kinda joke and talk about the, I say things like the black cyber Moses, but I don’t wanna get that deep, it’s not that deep. I’m just a guy that wants to see you all succeed.
Part of the free Intro to Cyber course by Cover6 Solutions.