Module 9 Summary

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
8 hours 28 minutes
Difficulty
Beginner
CEU/CPE
10
Video Transcription
00:00
Hello and congratulations on the successful completion of another application of the minor tech framework section within our lessons. So we got through a few areas in which we talked about lateral movement and things of that nature. So at this point, what should we know?
00:19
Well, we should know that lateral movement is the actions and adversary takes
00:24
to move through the network or environment. They're working to get to their primary objectives. They're exploiting the network. They're looking for targets, they're pivoting through multiple systems, and they're using custom tools and network voodoo to get into different systems and to further compromise your network. In this,
00:43
we looked at things like application deployment software, exploitation of remote services. Ssh, hijacking. We had a case study where we discussed some key things to consider with respect to a lateral movement.
00:55
And then we talked about mitigation and detection techniques for the given areas. So again, congratulations on the completion of these discussions in this module. I thank you for your time again, and I look forward to seeing you again soon.
Up Next