YoVDO

File Deletion

Offered By: Cybrary

Tags

Cybersecurity Courses

Course Description

Overview

Attackers will not only go back and delete their malware files after they achieve their goals, but they may even build in a self-delete function into their malware. They may remove dropper files, batch files, and other tools that would tip you off to their activities. Attackers will often use native system tools to perform this deletion, making it very tricky to detect and mitigate.

You'll want to learn more about this adversary behavior so you know how to detect and mitigate it.

Get the hands-on skills you need to detect and mitigate this attack in Cybrary's MITRE ATT&CK Framework courses aligned to the tactics and techniques used by the financially motivated threat group Prophet Spider. Prevent adversaries from accomplishing the tactic of Defense Evasion in your environment today.


Syllabus

  • File Deletion
    • What is File Deletion?
    • Detection, Validation, and Mitigation (Lab)

Taught by

Owen Dubiel and Matthew Mullins

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network