Non-Standard Port
Offered By: Cybrary
Course Description
Overview
Once an adversary has found their way into your environment, gotten a good look around, and decided it’s worth an extended stay, they will often set up command and control (C2). Although there are numerous ways to accomplish this goal, one of them is to allow these mechanisms to communicate over ports an organization may not be watching or blocking. Even more clever is when these C2 infrastructures communicate over known, encrypted ports such as HTTPS on 443. Although this behavior can be tricky to spot, it is possible with the right approach.
Get the hands-on skills you need to detect and mitigate this attack in Cybrary's MITRE ATT&CK Framework courses aligned to the tactics and techniques used by financially motivated threat group FIN7. Prevent adversaries from accomplishing the tactic of Command and Control in your environment today.
Syllabus
- Non-Standard Port
- What is a Non-Standard Port?
- Detection, Validation, and Mitigation (Lab)
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network