Module 8 Summary

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

8 hours 28 minutes
Video Transcription
Hello and congratulations for the completion of the discussions surrounding and on Discovery in that particular phase of the minor attack framework. So in summary for this particular section, what should we know?
Well, we should now know that discovery is essentially when a threat actor is
working out what is in the environment and so that again we're things like operating systems, internal network information. And we looked at some particular areas in which they would do that in some commands that were relevant. And so we covered the following components in our discussions account Discovery browser, bookmark, Discovery
System owner and user Discovery. And we looked at mitigation and detection techniques within each,
remembering that
most of the mitigation techniques were in usual industry and related and limitations on the command line and detection areas were more so, covering behavior analysis and looking for things that were abnormal within the environment that were out of the ordinary that weren't standard business process. Each of these areas
builds on the previous sections of the minor attack framework
and again is critical to a threat actor success in compromising systems. So with that in mind, I want to thank you again for your time today, and I look forward to seeing you again soon.
Up Next
Application of the MITRE ATT&CK Framework

This MITRE ATT&CK training is designed to teach students how to apply the matrix to help mitigate current threats. Students will move through the 12 core areas of the framework to develop a thorough understanding of various access ATT&CK vectors.

Instructed By