Application Layer Protocol: Web Protocols
In this course, students will learn how C2 connections are established and used by attackers in a real-world demonstration to give learners a sense of how to detect malicious HTTP traffic. This is the last course in the Raspberry Robin Attack series.
Course Description
Learn how to detect and mitigate these techniques to protect your organization from this type of attack. Apply what you learn and get the hands-on skills you need in Cybrary’s MITRE ATT&CK Framework courses aligned to tactics and techniques used by threat actors.
Learn how to detect and mitigate these techniques to protect your organization from this type of attack. Apply what you learn and get the hands-on skills you need in Cybrary’s MITRE ATT&CK Framework courses aligned to tactics and techniques used by threat actors.
Module 1: Introduction
Module 2: What is Technique T1071.001?
User Reviews
Be the first to review “Application Layer Protocol: Web Protocols”
You must be logged in to post a review.
There are no reviews yet.