8 hours 28 minutes
Hello and congratulations on the successful completion of another application of the minor tech framework section within our lessons. So we got through a few areas in which we talked about lateral movement and things of that nature. So at this point, what should we know?
Well, we should know that lateral movement is the actions and adversary takes
to move through the network or environment. They're working to get to their primary objectives. They're exploiting the network. They're looking for targets, they're pivoting through multiple systems, and they're using custom tools and network voodoo to get into different systems and to further compromise your network. In this,
we looked at things like application deployment software, exploitation of remote services. Ssh, hijacking. We had a case study where we discussed some key things to consider with respect to a lateral movement.
And then we talked about mitigation and detection techniques for the given areas. So again, congratulations on the completion of these discussions in this module. I thank you for your time again, and I look forward to seeing you again soon.
Become an Incident Handler
In this Career Path, you will learn the incident response process, from building an incident ...
Information Security Fundamentals
The foundational networking and security concepts taught in this career path form the backbone of ...