Тёмный
Cyber Gray Matter
Cyber Gray Matter
Cyber Gray Matter
Подписаться
I'm a security analyst, and my hope for this channel is to make videos that can help educate others to have a rudimentary understanding of more complex topics within the field.
MITRE ATT&CK Framework for Beginners
7:53
2 года назад
Комментарии
@malamdikereta
@malamdikereta 6 дней назад
This video from Cyber Gray Matter explains the MITRE ATT&CK framework, a tool used to understand cyber adversaries' tactics, techniques, and common knowledge. It's beneficial for professionals, students, and businesses, aiding both blue (defensive) and red (offensive) teams in cybersecurity. The video covers how to use the framework, search for vulnerabilities, and its applications in real-world scenarios. Takeaways 😀 The video introduces the MITRE ATT&CK framework, aiming to make it accessible to beginners and those unfamiliar with cybersecurity jargon. 🏢 MITRE Corporation, a not-for-profit organization in Bedford, Massachusetts, developed the ATT&CK framework. 💡 'ATT&CK' stands for Adversarial Tactics, Techniques, and Common Knowledge, focusing on how attackers operate and the techniques they use. 🌐 The framework is based on real-world data and reports submitted by users and researchers, making it a public resource. 💻 Both professionals and students can benefit from the MITRE ATT&CK framework, which is designed to be user-friendly even for those without dedicated cybersecurity teams. 🛡 The framework is used by both 'blue teams' (defenders) and 'red teams' (offensive security testers) to understand and counteract cyber threats. 🔍 Frameworks in cybersecurity, like grammar in language, provide a common language and understanding for various stakeholders. 🔗 MITRE ATT&CK is open and accessible, helping businesses and professionals protect themselves by understanding common vulnerabilities and threats. 💻 The framework covers not only Windows but also includes information on Linux, Mac, Android, and iOS, making it versatile for various platforms. 🔎 The MITRE website provides a searchable matrix of tactics, techniques, and procedures used by different threat groups, aiding in understanding specific attack patterns. 🔧 Tools like MITRE Detect and Atomic Red Team can be used to map data sources and emulate adversary techniques, helping to strengthen network defenses.
@tommone96
@tommone96 6 дней назад
Very nice video! But don’t you think MDR must be on top of EDR or XDR? I don’t see it as an alternative… and provoking here: what about NDR? 😁
@ChapalPuteh_
@ChapalPuteh_ 24 дня назад
Ifyou better at OSI, you will be great at Wireshark ..
@fastrobreetus
@fastrobreetus 28 дней назад
You are informative & inspirational!
@fastrobreetus
@fastrobreetus 28 дней назад
Great video!
@Seansaighdeoir
@Seansaighdeoir Месяц назад
Very interesting and informative, thanks for sharing. Found the music somewhat distracting - good info doesn't need accompaniment.
@gurashishanand3082
@gurashishanand3082 Месяц назад
Awesome video. I have my comptia security+ coming up. I understand how the OSI model works but I didn't have a vision of the attack surface. This really helped. Thanks.
@sametsahin-eh3qj
@sametsahin-eh3qj Месяц назад
cool video, next time you should put out the music
@jcohen661
@jcohen661 2 месяца назад
What a great video! Thank you. I havent come across a detailed categorization exercise like this before.
@user-ws3po9ef8z
@user-ws3po9ef8z 2 месяца назад
Name the step responsible for writing down every information that could be used and be classified as important. (2 words)
@Iohannis42
@Iohannis42 3 месяца назад
I passed the CASP but I still doubt myself.
@user-ux8uc4ks1m
@user-ux8uc4ks1m 3 месяца назад
This was an excellent description and loved the vide effects. Please continue to make more quality content like this. Very clearly explained.
@paragbarot2638
@paragbarot2638 3 месяца назад
I hope in next videos you will lower the background music. By the way this video is very informative.
@cStardust94
@cStardust94 3 месяца назад
Thank you for the introduction to the framework, helped me a lot.
@DavidCorlette
@DavidCorlette 3 месяца назад
This video is good, but next-gen AV has leveraged behavioral detection for zero-days for a long time - well before EDRs came on the scene. The real distinction between an NGAV and an EDR is that NGAV tries to take a black-and-white approach - it is or is not malicious. If a threat is classified as malicious (by actual signature-type detection or by hitting some statistical threshold in behavioral detection) the threat will be blocked and quarantined. The difference with EDR is in the name - EDR will also notify (Detect) about "grey area" potential threats that can't be confidently classified as malicious, and provide the telemetry (events) needed so that a human can investigate and make a decision. EDRs also provide post-attack remediation (Response) tools such as device isolation, remote shells, etc. Good EDR solutions include comprehensive NGAV so that you don't waste a lot of time chasing potential threats that could easily have been blocked by an NGAV.
@davionalexander147
@davionalexander147 3 месяца назад
Thanks for this!!
@johnvardy9559
@johnvardy9559 4 месяца назад
how i become soc analyst?
@michaelhurd4390
@michaelhurd4390 4 месяца назад
As a student at Colorado technical university it's good to know and understand defense in depth
@JamesFloydisnotmyname
@JamesFloydisnotmyname 4 месяца назад
Hello, is there a way to contact you if i have a question about something i don't want to discuss publicly?
@JamesFloydisnotmyname
@JamesFloydisnotmyname 4 месяца назад
@@cybergraymatterI want to publicly say thank you so very much. Your timely response is greatly appreciated.
@JamesFloydisnotmyname
@JamesFloydisnotmyname 3 месяца назад
I emailed you a month ago but I never received a response. Can you please respond? I also notice your response is not here, unless you deleted it?
@pauljee9528
@pauljee9528 4 месяца назад
Very thorough and informational, the value of soft skills are commonly overlooked in this field!
@cybergraymatter
@cybergraymatter 4 месяца назад
Thank you! I am working on a whole video on soft skills right now, actually! I want others to know they can be learned and the importance.
@SoberCatboy
@SoberCatboy 5 месяцев назад
Well done, as always 👏🏼 😸
@animeoverlord8327
@animeoverlord8327 5 месяцев назад
thank you for the great content!Writing my cc in isc2 exam next week , what would u recommend what to do next (i dont know coding)
@cybergraymatter
@cybergraymatter 5 месяцев назад
Thanks for your comment! I'd say study for the Security+ and get some projects going. Set up a cloud environment and find some labs on RU-vid. You can add those as experience to your resume! :)
@animeoverlord8327
@animeoverlord8327 4 месяца назад
@cybergraymatter HIII!!! I clreared the exam today! I will look into labs and if you can recommend anything please do. Thank you for the guidance
@cybergraymatter
@cybergraymatter 4 месяца назад
@@animeoverlord8327 That's amazing! Congratulations!!! Definitely check out Josh Madakor here on RU-vid. He has some awesome labs, one of which you set up a vulnerable machine in Azure and let people attack it. You can view the security events in Windows and set up a map with Powershell. It's really thrilling. Also, make sure to create a LinkedIn profile and create a network with other security professionals by adding them there.
@manojmahajan30
@manojmahajan30 5 месяцев назад
First one to watch.. Your videos are awesome.. Keep posting.. 😊
@cybergraymatter
@cybergraymatter 5 месяцев назад
Thanks for the support!
@barbobrien9318
@barbobrien9318 5 месяцев назад
Well done and well-organized. Thanks.
@waz1167
@waz1167 5 месяцев назад
Thanks for the great video!
@The_LEGO_Journal
@The_LEGO_Journal 6 месяцев назад
this is very cool!
@Angeleshaj
@Angeleshaj 6 месяцев назад
💪🏽💪🏽💪🏽
@cyberfabi
@cyberfabi 6 месяцев назад
helpful overview - thank you!!
@dontlikenamesonline5881
@dontlikenamesonline5881 6 месяцев назад
great video, thank you
@34meridian
@34meridian 6 месяцев назад
Fantastic video, very informative and breaks everything down well. Thanks!
@cracktabaan
@cracktabaan 7 месяцев назад
topic good but music spoil it.
@stevenp1961
@stevenp1961 7 месяцев назад
OMG, I'm not the only one. Steven Palange, CSO SoverAIgn Solutions. 😀
@stevenp1961
@stevenp1961 7 месяцев назад
It's a Girl? She's a Girl? 🥰
@cybergraymatter
@cybergraymatter 7 месяцев назад
Yep! Trying to do my part and represent
@gsxr750dude
@gsxr750dude 8 месяцев назад
love your voice, finally one i dont mind listening to
@AboodSpiN
@AboodSpiN 8 месяцев назад
Amazing video thank you so much!
@cybergraymatter
@cybergraymatter 8 месяцев назад
You're so welcome!
@AboodSpiN
@AboodSpiN 8 месяцев назад
Thank you so much for the content! subbed!
@cybergraymatter
@cybergraymatter 8 месяцев назад
Thanks for the sub!
@LiminalSpaceTarot
@LiminalSpaceTarot 8 месяцев назад
Great thumbnail, Grey! 😸 And good topic
@ishwaryanarayan1010
@ishwaryanarayan1010 8 месяцев назад
Your voice and speed make us to listen and learn enthusiastic way 😎
@ishwaryanarayan1010
@ishwaryanarayan1010 8 месяцев назад
Glad I found your channel ♥️
@ishwaryanarayan1010
@ishwaryanarayan1010 8 месяцев назад
Hey thanks for your videos it was very helpful. ❤I have been worked as a senior security analyst but now I have a career gap wish to reenter cyber security field . So updating my skills can you suggest some tips like what as all skills to be covered to getting back to this field . Can You make a video on typical day in life of a security analyst . And also cover topics like Demo of SIEM tool
@cybergraymatter
@cybergraymatter 8 месяцев назад
Thanks for your support! I can definitely make a video of a day in the life and what to expect as an analyst. It might be broader, as analysts often time wear many hats. This would also cover suggestions for the gaps you referenced. I will also do some research on SIEM labs I could set up.
@samvox994
@samvox994 8 месяцев назад
Great Work Concise Love it
@LiminalSpaceTarot
@LiminalSpaceTarot 8 месяцев назад
Nicely done, Grey! 😸
@cybergraymatter
@cybergraymatter 8 месяцев назад
Thank you! 😄
@manojmahajan30
@manojmahajan30 8 месяцев назад
Clear and crisp information, I was looking for something like this for a long time, thank you so much for sharing.. Already subscribed to your content.. 🙂
@sonnypastore3453
@sonnypastore3453 8 месяцев назад
great video and explanations, using to study for CISSP!
@Zheray
@Zheray 9 месяцев назад
Really helpful, thank you!
@autumn993
@autumn993 9 месяцев назад
Promo`SM
@theukhasgonetosht1704
@theukhasgonetosht1704 9 месяцев назад
Hi, just want to say your videos are really good. Please keep them coming. I watch a few cyber sec pages and you have better content than some of the more popular RU-vidrs. Thanks for the content!
@NostalgistGuy
@NostalgistGuy 9 месяцев назад
Thank you.
@gwalchmei
@gwalchmei 10 месяцев назад
Came across your channel through your last video on Threat Hunting, and I have to say, I feel lucky to have stumbled across your channel. Regardless of the complexity of the topic, your explanations are crystal clear. Love your video on the Diamond Model as well. This is a great amount of quality for a "smaller" channel. Looking forward to your next videos and seeing this channel grow. :)
@cybergraymatter
@cybergraymatter 10 месяцев назад
Thanks so much for your kind words! I try very hard to make things easy to understand for everyone. Appreciate your support!
@TaxXx_Man
@TaxXx_Man 10 месяцев назад
You guys have any advice? The world of cyber security is f'kn huge and I fear I'm wasting time