Module 12 Summary

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *

Already have an account? Sign In »

8 hours 39 minutes
Video Transcription
Hello and congratulations on the successful completion of another phase of the minor attack framework and our journey through the application of the minor attack framework and this particular module. What should we know now?
Well, we should know that ex filtration is when a threat actor is trying to still information or data and remove it from your network
that it consists of. Techniques can include things like compression and encryption to attempt to avoid protections. We should now have a high level understanding of what automated ex filtration is. Why data compression would be important in ex filtration attempts
and what data transfer size limits or within the context of this face.
We also looked at mitigation and detection techniques to include network intrusion prevention techniques in user awareness training and doing things again, like base lining network activity for comparison against day to day operations. To really see if we've got a threat actor on those systems, and if there's anything that's happening that is out on the norm,
remember, If you haven't identified baselines and you don't understand what normal is,
you really don't have the ability to identify what abnormal is as well. So with that in mind. I want to thank you for your time today, and I look forward to seeing you again soon.
Up Next