Module 8 Summary
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
Already have an account? Sign In »
8 hours 29 minutes
Hello and congratulations for the completion of the discussions surrounding and on Discovery in that particular phase of the minor attack framework. So in summary for this particular section, what should we know?
Well, we should now know that discovery is essentially when a threat actor is
working out what is in the environment and so that again we're things like operating systems, internal network information. And we looked at some particular areas in which they would do that in some commands that were relevant. And so we covered the following components in our discussions account Discovery browser, bookmark, Discovery
System owner and user Discovery. And we looked at mitigation and detection techniques within each,
most of the mitigation techniques were in usual industry and related and limitations on the command line and detection areas were more so, covering behavior analysis and looking for things that were abnormal within the environment that were out of the ordinary that weren't standard business process. Each of these areas
builds on the previous sections of the minor attack framework
and again is critical to a threat actor success in compromising systems. So with that in mind, I want to thank you again for your time today, and I look forward to seeing you again soon.