8 hours 28 minutes
hello and welcome to another application of the minor attack framework discussion. Today we're going to get into the ex filtration phase of the minor attack framework. So what is ex filtration? While ex filtration is when a threat actor is trying to steal information or data,
it can consist of techniques that include things such as compression and encryption
to attempt to avoid protections and detection while those activities air taking place. Now, with respect to what we will specifically be reviewing, we're going to focus on automated ex filtration data compression or compressed and data transfer limits.
So with that in mind, I want to thank you for your time today. And I look forward to seeing you again.
Become an Incident Handler
In this Career Path, you will learn the incident response process, from building an incident ...
Information Security Fundamentals
The foundational networking and security concepts taught in this career path form the backbone of ...