Skip to main contentSkip to main content
Room Banner
Back to all walkthroughs
Room Icon

Data Exfiltration Detection

Premium room

Learn how to detect data exfiltration attempts in various network channels.

medium

60 min

14,424

User profile photo.
User profile photo.

To access material, start machines and answer questions login.

Data exfiltration is the unauthorized transfer of sensitive data from a computer or other device. It's a primary objective for attackers who have breached a network. As a analyst, our job is to detect and stop this before sensitive information walks out the door. This room will cover the common techniques attackers use to steal data and, more importantly, how we can catch them in the act.

Learning Objectives

In this room, we will cover the following learning objectives:

  • Understand the common methods used for data exfiltration.
  • Learn how to detect exfiltration attempts using network traffic analysis.
  • Identify signs of exfiltration on endpoint devices.
  • Correlate logs in a to uncover hidden exfiltration channels.

Prerequsites

This room expects the users to have covered or explored the following rooms:

Let's begin our learning journey.

Answer the questions below

Continue to the next task.

Ready to learn Cyber Security?

The Data Exfiltration Detection room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.

Already have an account? Log in

We use cookies to ensure you get the best user experience. For more information see our cookie policy.