Time
8 hours 28 minutes
Difficulty
Beginner
CEU/CPE
10

Video Transcription

00:00
Hello and congratulations on the successful completion of another application of the minor tech framework section within our lessons. So we got through a few areas in which we talked about lateral movement and things of that nature. So at this point, what should we know?
00:19
Well, we should know that lateral movement is the actions and adversary takes
00:24
to move through the network or environment. They're working to get to their primary objectives. They're exploiting the network. They're looking for targets, they're pivoting through multiple systems, and they're using custom tools and network voodoo to get into different systems and to further compromise your network. In this,
00:43
we looked at things like application deployment software, exploitation of remote services. Ssh, hijacking. We had a case study where we discussed some key things to consider with respect to a lateral movement.
00:55
And then we talked about mitigation and detection techniques for the given areas. So again, congratulations on the completion of these discussions in this module. I thank you for your time again, and I look forward to seeing you again soon.

Up Next

Application of the MITRE ATT&CK Framework

This MITRE ATT&CK training is designed to teach students how to apply the matrix to help mitigate current threats. Students will move through the 12 core areas of the framework to develop a thorough understanding of various access ATT&CK vectors.

Instructed By

Instructor Profile Image
Robert Smith
Director of Security Services at Corsica
Instructor