YoVDO

Exfiltration Over Alternative Protocol

Offered By: Cybrary

Tags

Cybersecurity Courses Threat Detection Courses Threat Mitigation Courses Mitre Att&ck Framework Courses

Course Description

Overview

Organizations that don't have proper data loss prevention or network intrusion detection/prevention mechanisms in place could fall victim to attackers who use the Exfiltration over Alternative Protocol technique. Threat actors have been known to use this method to exfiltrate data to a URL, via UDP, or even over an email account, for example. There are numerous ways threat actors can use alternative protocols for nefarious means to steal data and put it where they can get to it later.

You will be in a better position to protect your organization from attackers who might want to steal valuable data once you learn how to detect and mitigate this activity.

Get the hands-on skills you need to detect and mitigate this attack in Cybrary's MITRE ATT&CK Framework courses aligned to the tactics and techniques used by the financially motivated threat group Prophet Spider. Prevent adversaries from accomplishing the tactic of Exfiltration in your environment today.


Syllabus

  • Exfiltration over Alternative Protocol
    • What is Exfiltration over Alternative Protocol?
    • Detection, Validation, and Mitigation (Lab)

Taught by

Owen Dubiel and Matthew Mullins

Related Courses

AWS Security Traffic Monitoring and Packet Analysis
Amazon Web Services via AWS Skill Builder
AWS: Threat Detection, Logging and Monitoring
Whizlabs via Coursera
Basics of Amazon GuardDuty (AWS Partner-led Support)
Amazon Web Services via AWS Skill Builder
Chronicle Technical Training
Google via Google Cloud Skills Boost
Cloud Security on AWS
Edureka via Coursera