Time
8 hours 28 minutes
Difficulty
Beginner
CEU/CPE
10

Video Transcription

00:00
Hello and congratulations for the completion of the discussions surrounding and on Discovery in that particular phase of the minor attack framework. So in summary for this particular section, what should we know?
00:15
Well, we should now know that discovery is essentially when a threat actor is
00:20
working out what is in the environment and so that again we're things like operating systems, internal network information. And we looked at some particular areas in which they would do that in some commands that were relevant. And so we covered the following components in our discussions account Discovery browser, bookmark, Discovery
00:39
System owner and user Discovery. And we looked at mitigation and detection techniques within each,
00:45
remembering that
00:47
most of the mitigation techniques were in usual industry and related and limitations on the command line and detection areas were more so, covering behavior analysis and looking for things that were abnormal within the environment that were out of the ordinary that weren't standard business process. Each of these areas
01:06
builds on the previous sections of the minor attack framework
01:10
and again is critical to a threat actor success in compromising systems. So with that in mind, I want to thank you again for your time today, and I look forward to seeing you again soon.

Up Next

Application of the MITRE ATT&CK Framework

This MITRE ATT&CK training is designed to teach students how to apply the matrix to help mitigate current threats. Students will move through the 12 core areas of the framework to develop a thorough understanding of various access ATT&CK vectors.

Instructed By

Instructor Profile Image
Robert Smith
Director of Security Services at Corsica
Instructor