1 00:00:06,830 --> 00:00:10,970 - Welcome to Lesson 7: Intrusion Event Categories. 2 00:00:10,970 --> 00:00:13,230 In this lesson, you will learn 3 00:00:13,230 --> 00:00:17,937 how to identify and mitigate reconnaissance attacks, 4 00:00:17,937 --> 00:00:21,540 exploit organization, malware delivery, 5 00:00:21,540 --> 00:00:24,750 and installation of malicious code. 6 00:00:24,750 --> 00:00:27,470 You will also learn how to identify 7 00:00:27,470 --> 00:00:30,950 and mitigate command and control communication, 8 00:00:30,950 --> 00:00:33,843 and the attackers actions and objective. 9 00:00:34,960 --> 00:00:38,660 The MITRE attack is a curated knowledge base 10 00:00:38,660 --> 00:00:41,890 and framework that describes the tactics 11 00:00:41,890 --> 00:00:44,770 and techniques used by threat actors 12 00:00:44,770 --> 00:00:46,950 in real life attacks. 13 00:00:46,950 --> 00:00:49,910 In this lesson, you will learn how to use 14 00:00:49,910 --> 00:00:51,510 the MITRE attack framework 15 00:00:51,510 --> 00:00:53,710 to better respond to incidents, 16 00:00:53,710 --> 00:00:55,220 perform threat hunting, 17 00:00:55,220 --> 00:00:58,010 and how can it also be used 18 00:00:58,010 --> 00:01:01,153 for ethical hacking and adversary emulation.