Time
8 hours 28 minutes
Difficulty
Beginner
CEU/CPE
10

Video Transcription

00:00
Hello And congratulations on the completion of the collection phase of the minor attack from working these discussions. So this is our summary video. And what should we know at this point?
00:13
Well, with respect to collection, what we should remember is that this is when a threat actor is collecting data of interest or data that meets their goals. Typically, this leads to data exfiltration and common information of interest include things like browser data, audio data, video data and email information and much, much more.
00:32
So within our particular discussions,
00:34
we covered the following bits of information. We looked at audio capture.
00:38
We talked about clipboard data and got a nice little example going there and data from local systems and just some our that could be used to collect information there. Again, we looked at some mitigation techniques and detection techniques across the given areas, focusing primarily on in user awareness training for mitigation purposes
00:56
and from a detection standpoint, looking at
00:59
fast groups of data to determine whether or not threat actors are active on our systems. And so again, congratulations. And with that, I want to thank you for your time today, and I look forward to seeing you again soon.

Up Next

Application of the MITRE ATT&CK Framework

This MITRE ATT&CK training is designed to teach students how to apply the matrix to help mitigate current threats. Students will move through the 12 core areas of the framework to develop a thorough understanding of various access ATT&CK vectors.

Instructed By

Instructor Profile Image
Robert Smith
Director of Security Services at Corsica
Instructor