Module 11 Summary

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
8 hours 28 minutes
Difficulty
Beginner
CEU/CPE
10
Video Transcription
00:00
Hello and congratulations on the successful completion of the commanding control phase of the minor attack framework discussions. So today we're going to just touch on a summary of what we should know now.
00:15
And what we should know is that command and control is where threat actors attempt to communicate with our systems and to control them,
00:21
that they mimic normal behavior to try and avoid detection. And then it can include methods such as connection proxies, data encoding and data office cation. We specifically looked at commonly used ports,
00:33
custom command and control protocol, and uncommonly use ports with a focus on threat actors trying to mimic normal activities while controlling our systems and using them either to do home to other individuals, businesses or systems, or in order to continue to
00:51
take information from our network
00:53
mitigation techniques, again focused on network intrusion prevention tactics as well as understanding our systems so that we can adequately baseline traffic and identify when threat actors are using our systems for evil. So with that, I want to thank you for your time today, and I look forward to seeing you again soon
Up Next
Application of the MITRE ATT&CK Framework

This MITRE ATT&CK training is designed to teach students how to apply the matrix to help mitigate current threats. Students will move through the 12 core areas of the framework to develop a thorough understanding of various access ATT&CK vectors.

Instructed By