وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

ICS/OT Cyber Attack Tactics Techniques MITRE Framework

سرفصل های دوره

Simplified understanding of adversary tactics and techniques based MITRE Framework for ICS, all techniques explained.


1 - Introduction
  • 1 - Introduction
  • 2 - Tactics

  • 2 - Initial Access
  • 3 - Initial Access
  • 4 - Driveby Compromise
  • 5 - Exploit PublicFacing Application
  • 6 - Exploitation of Remote Services
  • 7 - External Remote Services
  • 8 - Internet Accessible Device
  • 9 - Remote Services
  • 10 - Replication Through Removable Media
  • 11 - Rogue Master
  • 12 - Spearphishing Attachment
  • 13 - Supply Chain Compromise
  • 14 - Transient Cyber Asset
  • 15 - Wireless Compromise

  • 3 - Execution
  • 16 - Execution
  • 17 - Change Operating Mode
  • 18 - CommandLine Interface
  • 19 - Execution through API
  • 20 - Graphical User Interface
  • 21 - Hooking
  • 22 - Modify Controller Tasking
  • 23 - Native API
  • 24 - Scripting
  • 25 - User Execution

  • 4 - Persistence
  • 26 - Persistence
  • 27 - Modify Program
  • 28 - Module Firmware
  • 29 - Project File Infection
  • 30 - System Firmware
  • 31 - Valid Accounts

  • 5 - Privilege Escalation
  • 32 - Privilege Escalation
  • 33 - Exploitation for Privilege Escalation
  • 34 - Hooking

  • 6 - Evasion
  • 35 - Evasion
  • 36 - Exploitation for Evasion
  • 37 - Indicator Removal on Host
  • 38 - Masquerading
  • 39 - Rootkit
  • 40 - Spoof Reporting Message

  • 7 - Discovery
  • 41 - Discovery
  • 42 - Network Connection Enumeration
  • 43 - Network Sniffing
  • 44 - Remote System Discovery
  • 45 - Remote System Information Discovery
  • 46 - Wireless Sniffing

  • 8 - Lateral Movement
  • 47 - Lateral Movement
  • 48 - Default Credentials
  • 49 - Exploitation of Remote Services
  • 50 - Lateral Tool Transfer
  • 51 - Program Download
  • 52 - Remote Services

  • 9 - Collection
  • 53 - Collection
  • 54 - Automated Collection
  • 55 - Data from Information Repositories
  • 56 - Detect Operating Mode
  • 57 - IO Image
  • 58 - Man in the Middle
  • 59 - Monitor Process State
  • 60 - Point & Tag Identification
  • 61 - Program Upload
  • 62 - Screen Capture
  • 63 - Wireless Sniffing

  • 10 - Command and Control
  • 64 - Command & Control
  • 65 - Commonly Used Port
  • 66 - Connection Proxy
  • 67 - Standard Application Layer Protocol

  • 11 - Inhibit Response Function
  • 68 - Inhibit Response Function
  • 69 - Activate Firmware Update Mode
  • 70 - Alarm Suppression
  • 71 - Block Command Message
  • 72 - Block Reporting Message
  • 73 - Block Serial COM
  • 74 - Data Destruction
  • 75 - Denial of Service
  • 76 - Device RestartShutdown
  • 77 - Manipulate IO Image
  • 78 - Modify Alarm Settings
  • 79 - Service Stop

  • 12 - Impair Process Control
  • 80 - Impair Process Control
  • 81 - Brute Force IO
  • 82 - Modify Parameter
  • 83 - Unauthorized Command Message

  • 13 - Impact
  • 84 - Impact
  • 85 - Damage to Property
  • 86 - Denial of Control
  • 87 - Denial of View
  • 88 - Loss of Availability
  • 89 - Loss of Control
  • 90 - Loss of Productivity and Revenue
  • 91 - Loss of Protection
  • 92 - Loss of Safety
  • 93 - Loss of View
  • 94 - Manipulation of Control
  • 95 - Manipulation of View
  • 96 - Theft of Operational Information

  • 14 - Mitigation
  • 97 - Complete-Course-Material.pdf
  • 97 - Mitigation and MITRE Navigation
  • 97 - apt profiler.zip
  • 97 - mitiagtaion explorer open att&ck for ics tt&m tool.zip
  • 97 - mitre att&ck framework.zip
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 1380
    حجم: 4980 مگابایت
    مدت زمان: 330 دقیقه
    تاریخ انتشار: 26 دی 1401
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید