This course covers the Mitre TTP T1041- Exfiltration Over C2 channel, which involves exfiltrating data over a command and control (C2) channel. This technique is commonly used by threat actors to evade detection and exfiltrate sensitive information from compromised networks.
Learning Objectives
After completing MITRE ATT&CK TTP content, learners should be able to:
- Detect adversary usage of a technique or sub-technique in a hands-on environment.
- Explain possible approaches for setting up detection rules and recommending mitigations for the technique.
- Describe how an adversary might chain this technique together with adjacent or related techniques in order to accomplish objectives on goal.
- Provide examples of real-world procedures that illustrate the techniques.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Cyber Operations
- Exploitation Analysis