Search Header Logo
Most common cyberattack techniques of 2020

Most common cyberattack techniques of 2020

Assessment

Interactive Video

Architecture, Information Technology (IT)

University

Hard

Created by

Wayground Content

FREE Resource

The video discusses the 2021 threat detection report by Red Canary, highlighting the top ten threat techniques, many of which involve 'living off the land' attacks using existing tools like PowerShell. It emphasizes the importance of establishing a baseline of normal system behavior to detect anomalies. Key threats include signed binary process executions, system process modifications, scheduled tasks, credential dumping, and more. The video recommends using sysmon for logging and monitoring, and stresses the need for off-site log storage to prevent attackers from clearing logs.

Read more

1 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 1 pt

What new insight or understanding did you gain from this video?

Evaluate responses using AI:

OFF

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?