In this course, you will learn how attackers breach networks and achieve certain objectives like data theft and disruption. We explore the 'Cyber Kill Chain', a conceptual model of the hacking process. Taking each step in turn, we detail the considerations that hackers must make to avoid detection and infiltrate target networks. At the end of this lecture, you will have a conceptual understanding of the foundations of hacking.
This lecture is part of the 'National Security and Cyber: Hackers, Artificial Intelligence and Surveillance' lecture series, taking place on Tuesdays from 16 September to 21 October 2025. You can choose to register for individual lectures or may choose to register for the entire lecture series at a reduced price.
Due to the nature of the contents of this lecture, it is not suitable for people under 18 years old.
Please note: this lecture will close to enrolments at 23:59 BST (UTC+1) on 19 September 2025.