Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Dr Jason Edwards and Dr. Jason Edwards. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Dr Jason Edwards and Dr. Jason Edwards or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Episode 107: Cyber Kill Chains – From Recon to Exploitation

14:26
 
Share
 

Manage episode 494503752 series 3677570
Content provided by Dr Jason Edwards and Dr. Jason Edwards. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Dr Jason Edwards and Dr. Jason Edwards or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

To stop an attack, you must understand its progression. In this episode, we explore the Lockheed Martin Cyber Kill Chain—a widely used framework that maps the stages of a cyberattack from initial reconnaissance through delivery, exploitation, command and control, and beyond. You’ll learn how attackers move through each phase, and how defenders can detect and disrupt their efforts at multiple points along the chain.

We also discuss how kill chain thinking supports proactive defense, threat hunting, and tailored response strategies. Whether you're analyzing alerts in a SIEM or writing an executive summary after a breach, understanding the attacker’s lifecycle allows you to tell a more accurate, actionable story. This episode builds your analytical awareness and prepares you for scenario-based CySA+ questions involving multi-stage attacks. Brought to you by BareMetalCyber.com

  continue reading

130 episodes

Artwork
iconShare
 
Manage episode 494503752 series 3677570
Content provided by Dr Jason Edwards and Dr. Jason Edwards. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Dr Jason Edwards and Dr. Jason Edwards or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

To stop an attack, you must understand its progression. In this episode, we explore the Lockheed Martin Cyber Kill Chain—a widely used framework that maps the stages of a cyberattack from initial reconnaissance through delivery, exploitation, command and control, and beyond. You’ll learn how attackers move through each phase, and how defenders can detect and disrupt their efforts at multiple points along the chain.

We also discuss how kill chain thinking supports proactive defense, threat hunting, and tailored response strategies. Whether you're analyzing alerts in a SIEM or writing an executive summary after a breach, understanding the attacker’s lifecycle allows you to tell a more accurate, actionable story. This episode builds your analytical awareness and prepares you for scenario-based CySA+ questions involving multi-stage attacks. Brought to you by BareMetalCyber.com

  continue reading

130 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play