Hello and welcome to the course overview for the application of the minor attack framework. I'm so excited to have you here with me today. I am your instructor, Robert Smith. So
a little bit about me before we jump in, I've got over a decade of I T and I t security experience of work in various areas. I actually have my humble beginnings, is a networking specialist and helped us support specialists. Of those were the areas where I worked predominantly
and then I worked my way into the security industry. So I've gotten several certifications to include all the CPC, SSP and CISA,
and I've currently am conducting penetration tests and assessments as my day to day. I've been working with Cyber for almost two years, bringing you things like the P test standard videos, the Cali videos as well as these minor videos, and are Siri's breaking stuff with Robert.
I also love video games and good books. You can catch me playing things like Diablo and dark souls and demons, souls and things of that nature. So I love a good
challenge when it comes to gaming. Just like I enjoy things like Hack the box and penetration, testing and things of that nature, so I like a good puzzle.
So what are some pre requisites when it comes to
the application of the minor attack framework, where you want to come into this with a basic technical terminology? So knowing how computers and networks work at a high level basic terminology with respect to controls, countermeasures and risk production as well. So essentially as we're walking through these things and we're talking about firewalls and compensating controls and,
uh, end user education and policies and procedures where those come up,
you want to kind of be aware what those things mean and how they fit into the grand scheme of this framework.
Now our target audience is going to be business leaders looking to understand current attack vectors and controls security leaders looking to understand how minor can be applied to your operations, analysts looking to map vectors to their efforts and solutions,
and vendors looking to provide map ings to their offerings against the framework. Anyone can really enjoy this and can kind of
play, you know what if and walk through the framework and see what an attacker may do and then come up with scenarios that they could use to combat that
the objectives of this course are to describe for you what the framework is. And then we will also go through each of the phases. Initial access, execution, persistence, privilege escalation, defense evasion, credential, access, Discovery, lateral movement, collection, commanding control, ex filtration and impact. Each of these,
we'll have several vectors that will cover. And a threat actor would essentially move
through each of these faces as they're attacking an organization. Well, I'm excited to get started and work with you on this. I want to thank you for viewing this overview. And with that, we're gonna walk into what is the minor attack framework?