Time
8 hours 28 minutes
Difficulty
Beginner
CEU/CPE
10

Video Transcription

00:00
Hello and congratulations on the successful completion of another phase of the minor attack framework and our journey through the application of the minor attack framework and this particular module. What should we know now?
00:15
Well, we should know that ex filtration is when a threat actor is trying to still information or data and remove it from your network
00:23
that it consists of. Techniques can include things like compression and encryption to attempt to avoid protections. We should now have a high level understanding of what automated ex filtration is. Why data compression would be important in ex filtration attempts
00:41
and what data transfer size limits or within the context of this face.
00:47
We also looked at mitigation and detection techniques to include network intrusion prevention techniques in user awareness training and doing things again, like base lining network activity for comparison against day to day operations. To really see if we've got a threat actor on those systems, and if there's anything that's happening that is out on the norm,
01:07
remember, If you haven't identified baselines and you don't understand what normal is,
01:11
you really don't have the ability to identify what abnormal is as well. So with that in mind. I want to thank you for your time today, and I look forward to seeing you again soon.

Up Next

Application of the MITRE ATT&CK Framework

This MITRE ATT&CK training is designed to teach students how to apply the matrix to help mitigate current threats. Students will move through the 12 core areas of the framework to develop a thorough understanding of various access ATT&CK vectors.

Instructed By

Instructor Profile Image
Robert Smith
Director of Security Services at Corsica
Instructor