Menu
Sign In Pricing Add Podcast

The Changelog: Software Development, Open Source

The great escape room (Friends)

4440.223 - 4463.693 Suz Hinton

binary executables you had to figure out how the docker container got compromised then you had to reverse engineer the protocol that the threat actors were using on the network and then you had to kind of then hack back into their computer to find further evidence you know and i think being able to sift through evidence like that is probably the the best skill to practice when it comes to wanting to get into that side of cyber security

0
💬 0

Comments

There are no comments yet.

Log in to comment.