This is by far, the best Kill chain explanation I have ever come across, I have got an exam tomorrow and this clip equipped my understanding 100%, thank you very much.
Such a good break down of a simple, yet complicated concept. I would encourage everyone to remember that many of these steps have been formed into "easy to use" packages that a novice can use. And I appreciate the acknowledgement that the most simple controls are the most effective: user awareness, patching, maintained access controls to data, and segmentation practices. Again, well done.
Very helpful. The only suggestion i have is slow down? I found myself pausing and re-widning to make bullet points about 15 times per step of the chain, lol. Cheers
Absolutely excellent explanation of the Cyber Kill Chain. Visually appealing presentation and brief but content-dense. I have passed this on to some colleagues as I think this is relevant for everyone, especially cybersecurity professionals.
Indeed a great overview of a defensive approach to stopping an attack. I would love to see a similar breakdown for a Detection & Response centric approach. I noticed you only mentioned UEBA and EDR as behavioural detection tools while I would argue NTA and NDR are core to any good detection strategy, especially as they are able to detect behaviours even if the traffic is encrypted. I recently read an interesting report from Gartner called "Applying Network-Centric Approaches for Threat Detection and Response" with interesting recommendations around how to build up your SOC-visibility. Just my 2 cents. Thanks for a great video!
You're really perfect! Thank you for a superb explanation like this! The best explanation I ever saw. I want to personally "Thank you" for a video like this one. 👍
In 03:00 tools you've mentioned There is FRATRAT which may be referring to FATRAT That consumed my time for upto 5mins to figure out what's frat and why it is mentioned on the Tool name Then I got to know it's a tool which is fatrat Pls clarify !!!
I'm disappointed that people are still talking about blocking Tor (~2:09) in 2019 and 2020. People deserve privacy, and your demonizing Tor isn't useful in this regard.
Andy hands down, this one THE Best video I've watch about cybersecurity. It covers a lot of grounds if you know how to study the video and unpack all its content. Great job! Needless to say that I subscribe to your channel! A+ Are you on Linkedin? or better yet do you mind sharing your Linkedin info.
All of this because computers still aren’t designed to airgap the operating system & driver/controllers from other software. Power shell itself is a crazily reckless utility for never requiring a prompt to confirm. In iOS a shortcut can’t even execute another shortcut without you confirming it. But in windows, a ps1 that’s never been ran before, and has never been authorized, can quietly run in the background without the user ever knowing. It’s just lazy
Best detailed explanation of Kill chain ever seen.
Exactly what I was about to comment! Great video!
00:40 - Reconnaissance
02:21 - Weaponization
03:49 - Delivery
05:48 - Exploitation
07:22 - Installation
08:55 - Command & Control
10:51 - Actions on Objectives
This is by far the most comprehensive and easy to digest explanation of Kill Chain I have ever seen. Really.
This is by far, the best Kill chain explanation I have ever come across, I have got an exam tomorrow and this clip equipped my understanding 100%, thank you very much.
Superb description of kill chain...clear, illustrative, bravo!
Such a good break down of a simple, yet complicated concept. I would encourage everyone to remember that many of these steps have been formed into "easy to use" packages that a novice can use. And I appreciate the acknowledgement that the most simple controls are the most effective: user awareness, patching, maintained access controls to data, and segmentation practices. Again, well done.
Undoubtedly the best video on this topic! 👌
Very helpful. The only suggestion i have is slow down? I found myself pausing and re-widning to make bullet points about 15 times per step of the chain, lol.
Cheers
Excellent, thank you for including mitigation in detail as well.
Absolutely excellent explanation of the Cyber Kill Chain. Visually appealing presentation and brief but content-dense. I have passed this on to some colleagues as I think this is relevant for everyone, especially cybersecurity professionals.
after watching this video if you don't understand the kill chain steps you never will, great work and thank you for this video
I usually do not comment on videos. But this is the best video UA-cam has. 1000000%.
Easy and to the point explanation of each step. very good.
Thats a really amazing video right there. Perfect explanation about everything.
thanks, very good explanation!
Very useful, to the point. well done.
This really breaks it down! Thanks for sharing!
Thank you CISO team! Your videos are great!
Great insight and information to the point. Well done!
This presentation was amazing !!!! made me SUBSCRIBE and Like the video.
This video was absolutely incredible. Great work!
Is there a problem with audio ? ..content is 🔥🔥🔥
Amazing video .. I cannot believe this is free content !
Excellent explanation 👏👌 , Thanks for your time and efforts.
Great material. It is very dense and on spot. Exactly what the always busy IT professional should watch.
Indeed a great overview of a defensive approach to stopping an attack. I would love to see a similar breakdown for a Detection & Response centric approach. I noticed you only mentioned UEBA and EDR as behavioural detection tools while I would argue NTA and NDR are core to any good detection strategy, especially as they are able to detect behaviours even if the traffic is encrypted. I recently read an interesting report from Gartner called "Applying Network-Centric Approaches for Threat Detection and Response" with interesting recommendations around how to build up your SOC-visibility. Just my 2 cents. Thanks for a great video!
The best damn explanation ever hands down.
Thanks Joel!
You're really perfect! Thank you for a superb explanation like this! The best explanation I ever saw.
I want to personally "Thank you" for a video like this one.
👍
Nicely explained with the sketches. Thanks!
🙏 Thanks for this informative video, you make my life easier with suck simple content.
Thank you very much for this video.
Fantastic Video and it is very easy to understand, Please upload more videos bro.
Excellent video. Well done!
Very well put together.... Thanks for helping with my assignments
So very good explanation. Thanks for creating and sharing
Fantastic break down of kill chain!
wow.So well explained, thanks!
สุดจริง ๆ ชอบมาก เยี่ยมมาก Greeting from Thailand :)
Very good.
But please slow down, you’re talking way too fast.
Many, many thanks for an exellent explanation!!!
Another great one, thanks Andy!
Your videos are really informativ , can you make a detail video on NIST frame work and control.
This video is amazing and your channel too.
This is a great video
Do you have a graphic for all the drawings as a jpeg?
Very well explained ! Thank's.
Great summary!
Crystal clear explanation...
In 03:00 tools you've mentioned
There is FRATRAT which may be referring to FATRAT
That consumed my time for upto 5mins to figure out what's frat and why it is mentioned on the Tool name
Then I got to know it's a tool which is fatrat
Pls clarify !!!
This was amazing
Awesome very very awesome
😄Very Informative
Very good videos from CISO Perspective. The narration is too fast, will be helpful for all audience if you could slow down
very useful 👌
Great video
Excellent explanation, thank you
Would it be possible to obtain the completed slides?
Thank you for this content!
Excellent presentation 👍👍👍👍
This video is amazing!
Thank you!
thanks
Genius
Thank you so much. Absolute Gold. Do you host a web portal. Thanks again.
Hello, very interesting
What tool do you use to create this type of animated content?
I'm disappointed that people are still talking about blocking Tor (~2:09) in 2019 and 2020. People deserve privacy, and your demonizing Tor isn't useful in this regard.
just implement MITRE framework using purple teaming and you will be ok
Any video on MITTRE ATT&C..??
Sound volume too low.
Andy hands down, this one THE Best video I've watch about cybersecurity. It covers a lot of grounds if you know how to study the video and unpack all its content. Great job!
Needless to say that I subscribe to your channel! A+
Are you on Linkedin? or better yet do you mind sharing your Linkedin info.
Much appreciated Sam, thank you 🙏
Yes, add me on LinkedIn: tcp-andy
Audio is VERY quiet.
All of this because computers still aren’t designed to airgap the operating system & driver/controllers from other software. Power shell itself is a crazily reckless utility for never requiring a prompt to confirm.
In iOS a shortcut can’t even execute another shortcut without you confirming it.
But in windows, a ps1 that’s never been ran before, and has never been authorized, can
quietly run in the background without the user ever knowing. It’s just lazy
the audio is so low :(
I watch most of UA-cam at 2x speed... that was not a good idea for this video :P
You talk fast. Good content though.
谁能翻译下这个视频再发一个
Quick! Add the IPs of anyone who disliked the video to your threat feed 😄
Post as much stuff about Jesus and the evil people will have to reconnaissance their destruction from their evil doing.
yall need to work on your audio, LUFs are way to low, your audio master is lacking dbs