Video upload date:  · Duration: PT1H46M27S  · Language: EN

A military defense contracting company has eccouncil video

ethical-hacker video for a military defense contracting company has hired your company to conduct a penetration test against their networks. Their company has a

This is a dedicated watch page for a single video.

Full Certification Question

A military defense contracting company has hired your company to conduct a penetration test against their networks. Their company has a strong vulnerability management program in place, but they are concerned that they may still be subject to remote hackers' intrusion. They have asked your company to create a red team with their most skilled hackers and conduct a long-term engagement over 6-12 months. The goal of this assessment is to emulate an attacking group that uses stealth while infiltrating the network, quietly maintaining persistence, and slowly exfiltrating data out of the network over time to determine if their cybersecurity analysts could detect this type of threat. Which of the following type of threat actors will your red team need to emulate?