Such a good break down of a simple, yet complicated concept. I would encourage everyone to remember that many of these steps have been formed into "easy to use" packages that a novice can use. And I appreciate the acknowledgement that the most simple controls are the most effective: user awareness, patching, maintained access controls to data, and segmentation practices. Again, well done.
This is by far, the best Kill chain explanation I have ever come across, I have got an exam tomorrow and this clip equipped my understanding 100%, thank you very much.
It's a Good Explanation of the Kill Chain; I enjoyed it. It gives a strong overview, and I like the strategic approach and breakdown. A great starting point to begin planning.
Very helpful. The only suggestion i have is slow down? I found myself pausing and re-widning to make bullet points about 15 times per step of the chain, lol. Cheers
Absolutely excellent explanation of the Cyber Kill Chain. Visually appealing presentation and brief but content-dense. I have passed this on to some colleagues as I think this is relevant for everyone, especially cybersecurity professionals.
Indeed a great overview of a defensive approach to stopping an attack. I would love to see a similar breakdown for a Detection & Response centric approach. I noticed you only mentioned UEBA and EDR as behavioural detection tools while I would argue NTA and NDR are core to any good detection strategy, especially as they are able to detect behaviours even if the traffic is encrypted. I recently read an interesting report from Gartner called "Applying Network-Centric Approaches for Threat Detection and Response" with interesting recommendations around how to build up your SOC-visibility. Just my 2 cents. Thanks for a great video!
You're really perfect! Thank you for a superb explanation like this! The best explanation I ever saw. I want to personally "Thank you" for a video like this one. 👍
In 03:00 tools you've mentioned There is FRATRAT which may be referring to FATRAT That consumed my time for upto 5mins to figure out what's frat and why it is mentioned on the Tool name Then I got to know it's a tool which is fatrat Pls clarify !!!
Andy hands down, this one THE Best video I've watch about cybersecurity. It covers a lot of grounds if you know how to study the video and unpack all its content. Great job! Needless to say that I subscribe to your channel! A+ Are you on Linkedin? or better yet do you mind sharing your Linkedin info.
I'm disappointed that people are still talking about blocking Tor (~2:09) in 2019 and 2020. People deserve privacy, and your demonizing Tor isn't useful in this regard.
All of this because computers still aren’t designed to airgap the operating system & driver/controllers from other software. Power shell itself is a crazily reckless utility for never requiring a prompt to confirm. In iOS a shortcut can’t even execute another shortcut without you confirming it. But in windows, a ps1 that’s never been ran before, and has never been authorized, can quietly run in the background without the user ever knowing. It’s just lazy
Best detailed explanation of Kill chain ever seen.
Exactly what I was about to comment! Great video!
This is by far the most comprehensive and easy to digest explanation of Kill Chain I have ever seen. Really.
00:40 - Reconnaissance
02:21 - Weaponization
03:49 - Delivery
05:48 - Exploitation
07:22 - Installation
08:55 - Command & Control
10:51 - Actions on Objectives
after watching this video if you don't understand the kill chain steps you never will, great work and thank you for this video
Such a good break down of a simple, yet complicated concept. I would encourage everyone to remember that many of these steps have been formed into "easy to use" packages that a novice can use. And I appreciate the acknowledgement that the most simple controls are the most effective: user awareness, patching, maintained access controls to data, and segmentation practices. Again, well done.
This is by far, the best Kill chain explanation I have ever come across, I have got an exam tomorrow and this clip equipped my understanding 100%, thank you very much.
Superb description of kill chain...clear, illustrative, bravo!
I usually do not comment on videos. But this is the best video TH-cam has. 1000000%.
It's a Good Explanation of the Kill Chain; I enjoyed it. It gives a strong overview, and I like the strategic approach and breakdown. A great starting point to begin planning.
Excellent, thank you for including mitigation in detail as well.
Very helpful. The only suggestion i have is slow down? I found myself pausing and re-widning to make bullet points about 15 times per step of the chain, lol.
Cheers
Undoubtedly the best video on this topic! 👌
Absolutely excellent explanation of the Cyber Kill Chain. Visually appealing presentation and brief but content-dense. I have passed this on to some colleagues as I think this is relevant for everyone, especially cybersecurity professionals.
Easy and to the point explanation of each step. very good.
Is there a problem with audio ? ..content is 🔥🔥🔥
Thats a really amazing video right there. Perfect explanation about everything.
thanks, very good explanation!
Very useful, to the point. well done.
Indeed a great overview of a defensive approach to stopping an attack. I would love to see a similar breakdown for a Detection & Response centric approach. I noticed you only mentioned UEBA and EDR as behavioural detection tools while I would argue NTA and NDR are core to any good detection strategy, especially as they are able to detect behaviours even if the traffic is encrypted. I recently read an interesting report from Gartner called "Applying Network-Centric Approaches for Threat Detection and Response" with interesting recommendations around how to build up your SOC-visibility. Just my 2 cents. Thanks for a great video!
Amazing video .. I cannot believe this is free content !
Do you have a graphic for all the drawings as a jpeg?
This really breaks it down! Thanks for sharing!
Thank you CISO team! Your videos are great!
Excellent explanation 👏👌 , Thanks for your time and efforts.
So very good explanation. Thanks for creating and sharing
This video was absolutely incredible. Great work!
Great material. It is very dense and on spot. Exactly what the always busy IT professional should watch.
Great insight and information to the point. Well done!
Excellent video. Well done!
This presentation was amazing !!!! made me SUBSCRIBE and Like the video.
Very well put together.... Thanks for helping with my assignments
The best damn explanation ever hands down.
Thanks Joel!
Nicely explained with the sketches. Thanks!
Fantastic Video and it is very easy to understand, Please upload more videos bro.
🙏 Thanks for this informative video, you make my life easier with suck simple content.
Fantastic break down of kill chain!
You're really perfect! Thank you for a superb explanation like this! The best explanation I ever saw.
I want to personally "Thank you" for a video like this one.
👍
Your videos are really informativ , can you make a detail video on NIST frame work and control.
wow.So well explained, thanks!
In 03:00 tools you've mentioned
There is FRATRAT which may be referring to FATRAT
That consumed my time for upto 5mins to figure out what's frat and why it is mentioned on the Tool name
Then I got to know it's a tool which is fatrat
Pls clarify !!!
Would it be possible to obtain the completed slides?
สุดจริง ๆ ชอบมาก เยี่ยมมาก Greeting from Thailand :)
Many, many thanks for an exellent explanation!!!
Another great one, thanks Andy!
Crystal clear explanation...
Thank you very much for this video.
Very well explained ! Thank's.
This video is amazing and your channel too.
Great summary!
Very good videos from CISO Perspective. The narration is too fast, will be helpful for all audience if you could slow down
Excellent presentation 👍👍👍👍
Excellent explanation, thank you
Great video
Thank you so much. Absolute Gold. Do you host a web portal. Thanks again.
😄Very Informative
Andy hands down, this one THE Best video I've watch about cybersecurity. It covers a lot of grounds if you know how to study the video and unpack all its content. Great job!
Needless to say that I subscribe to your channel! A+
Are you on Linkedin? or better yet do you mind sharing your Linkedin info.
Much appreciated Sam, thank you 🙏
Yes, add me on LinkedIn: tcp-andy
Very good.
But please slow down, you’re talking way too fast.
This is a great video
Thank you for this content!
This was amazing
This video is amazing!
Thank you!
Hello, very interesting
What tool do you use to create this type of animated content?
Any video on MITTRE ATT&C..??
very useful 👌
Awesome very very awesome
just implement MITRE framework using purple teaming and you will be ok
Sound volume too low.
I'm disappointed that people are still talking about blocking Tor (~2:09) in 2019 and 2020. People deserve privacy, and your demonizing Tor isn't useful in this regard.
thanks
Audio is VERY quiet.
Genius
Donavon Brook
All of this because computers still aren’t designed to airgap the operating system & driver/controllers from other software. Power shell itself is a crazily reckless utility for never requiring a prompt to confirm.
In iOS a shortcut can’t even execute another shortcut without you confirming it.
But in windows, a ps1 that’s never been ran before, and has never been authorized, can
quietly run in the background without the user ever knowing. It’s just lazy
谁能翻译下这个视频再发一个
Koch Cliffs
the audio is so low :(
I watch most of TH-cam at 2x speed... that was not a good idea for this video :P
You talk fast. Good content though.
Post as much stuff about Jesus and the evil people will have to reconnaissance their destruction from their evil doing.
yall need to work on your audio, LUFs are way to low, your audio master is lacking dbs