a,
@a@paperbay.org avatar

@SecurityWriter I have the same experience. As an example, I gave them some CTI courses and they are blown away when I show the use of the routing analysis from TTL to BGP peering to explain how an adversary infrastructure operates. It seems they had more sessions about policy, risk assessment and legal than actually the basis of operating system and networking.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • ngwrru68w68
  • rosin
  • GTA5RPClips
  • osvaldo12
  • love
  • Youngstown
  • slotface
  • khanakhh
  • everett
  • kavyap
  • mdbf
  • DreamBathrooms
  • thenastyranch
  • magazineikmin
  • megavids
  • InstantRegret
  • normalnudes
  • tacticalgear
  • cubers
  • ethstaker
  • modclub
  • cisconetworking
  • Durango
  • anitta
  • Leos
  • tester
  • provamag3
  • JUstTest
  • All magazines