What is Exfiltration?

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
8 hours 28 minutes
Difficulty
Beginner
CEU/CPE
10
Video Transcription
00:00
hello and welcome to another application of the minor attack framework discussion. Today we're going to get into the ex filtration phase of the minor attack framework. So what is ex filtration? While ex filtration is when a threat actor is trying to steal information or data,
00:18
it can consist of techniques that include things such as compression and encryption
00:23
to attempt to avoid protections and detection while those activities air taking place. Now, with respect to what we will specifically be reviewing, we're going to focus on automated ex filtration data compression or compressed and data transfer limits.
00:42
So with that in mind, I want to thank you for your time today. And I look forward to seeing you again.
00:48
Sure.
Up Next
Application of the MITRE ATT&CK Framework

This MITRE ATT&CK training is designed to teach students how to apply the matrix to help mitigate current threats. Students will move through the 12 core areas of the framework to develop a thorough understanding of various access ATT&CK vectors.

Instructed By