
Most common cyberattack techniques of 2020
Interactive Video
•
Architecture, Information Technology (IT)
•
University
•
Hard
Wayground Content
FREE Resource
The video discusses the 2021 threat detection report by Red Canary, highlighting the top ten threat techniques, many of which involve 'living off the land' attacks using existing tools like PowerShell. It emphasizes the importance of establishing a baseline of normal system behavior to detect anomalies. Key threats include signed binary process executions, system process modifications, scheduled tasks, credential dumping, and more. The video recommends using sysmon for logging and monitoring, and stresses the need for off-site log storage to prevent attackers from clearing logs.
Read more
1 questions
Show all answers
1.
OPEN ENDED QUESTION
3 mins • 1 pt
What new insight or understanding did you gain from this video?
Evaluate responses using AI:
OFF
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?