The Changelog: Software Development, Open Source
The great escape room (Friends)
Suz Hinton
binary executables you had to figure out how the docker container got compromised then you had to reverse engineer the protocol that the threat actors were using on the network and then you had to kind of then hack back into their computer to find further evidence you know and i think being able to sift through evidence like that is probably the the best skill to practice when it comes to wanting to get into that side of cyber security
0
💬
0
Comments
Log in to comment.
There are no comments yet.