Time
8 hours 28 minutes
Difficulty
Beginner
CEU/CPE
10

Video Transcription

00:00
hello and welcome to another application of the minor attack framework discussion. Today we're going to get into the ex filtration phase of the minor attack framework. So what is ex filtration? While ex filtration is when a threat actor is trying to steal information or data,
00:18
it can consist of techniques that include things such as compression and encryption
00:23
to attempt to avoid protections and detection while those activities air taking place. Now, with respect to what we will specifically be reviewing, we're going to focus on automated ex filtration data compression or compressed and data transfer limits.
00:42
So with that in mind, I want to thank you for your time today. And I look forward to seeing you again.
00:48
Sure.

Up Next

Application of the MITRE ATT&CK Framework

This MITRE ATT&CK training is designed to teach students how to apply the matrix to help mitigate current threats. Students will move through the 12 core areas of the framework to develop a thorough understanding of various access ATT&CK vectors.

Instructed By

Instructor Profile Image
Robert Smith
Director of Security Services at Corsica
Instructor