|  

Udemy - MITRE ATT and CK Framework Essentials



Size :1.1 GB
Peers : Seeders : 0      Leechers : 0
Added : 10 months ago » by freecoursewb » in Other
Language : English
Last Updated :7 months ago
Info_Hash :58B3C75FE3304DF1A28908DC0B160945703BB972

Torrent File Contents

Udemy - MITRE ATT and CK Framework Essentials
  Get Bonus Downloads Here.url
  -  182 Bytes

  ~Get Your Files Here !/1. Introduction/1. Introduction.mp4
  -  62.35 MB

  ~Get Your Files Here !/1. Introduction/2. Core Concepts and Terminology.mp4
  -  95.22 MB

  ~Get Your Files Here !/1. Introduction/2.1 World's Biggest Data Breaches & Hacks.html
  -  146 Bytes

  ~Get Your Files Here !/1. Introduction/3. Structure of the Framework- Matrices for Enterprise, Mobile, and ICS.mp4
  -  63.64 MB

  ~Get Your Files Here !/1. Introduction/4. The Importance of ATT&CK in Modern Cybersecurity Practices.mp4
  -  44.6 MB

  ~Get Your Files Here !/1. Introduction/5. Community and Ecosystem of ATT&CK.mp4
  -  38.26 MB

  ~Get Your Files Here !/1. Introduction/6. LAB Attack Navigator Tool - Introduction 1.mp4
  -  24.59 MB

  ~Get Your Files Here !/1. Introduction/7. LAB Attack Navigator Tool - Introduction 2.mp4
  -  57.15 MB

  ~Get Your Files Here !/1. Introduction/8. The Pyramid of Pain.mp4
  -  4.36 MB

  ~Get Your Files Here !/1. Introduction/8.1 What is the Pyramid of Pain.html
  -  111 Bytes

  ~Get Your Files Here !/2. Tactics, Techniques, and Procedures (TTPs)/1. Overview of Tactics Goals and Objectives of Adversaries.mp4
  -  134.52 MB

  ~Get Your Files Here !/2. Tactics, Techniques, and Procedures (TTPs)/10. Lab - Filtering.mp4
  -  38.26 MB

  ~Get Your Files Here !/2. Tactics, Techniques, and Procedures (TTPs)/11. Lab - Overlapping Combining Layers.mp4
  -  96.27 MB

  ~Get Your Files Here !/2. Tactics, Techniques, and Procedures (TTPs)/2. Breakdown of Techniques Specific Methods Used by Adversaries.mp4
  -  64.68 MB

  ~Get Your Files Here !/2. Tactics, Techniques, and Procedures (TTPs)/3. Procedures Real-World Implementations of Techniques.mp4
  -  26.44 MB

  ~Get Your Files Here !/2. Tactics, Techniques, and Procedures (TTPs)/4. Mapping TTPs to Known Threat Groups and Incidents.mp4
  -  54.09 MB

  ~Get Your Files Here !/2. Tactics, Techniques, and Procedures (TTPs)/5. Continuous Updates and Expansions to the Framework.mp4
  -  34.35 MB

  ~Get Your Files Here !/2. Tactics, Techniques, and Procedures (TTPs)/6. Lab - Demo ATT&CK navigator Color coding and Search.mp4
  -  69.38 MB

  ~Get Your Files Here !/2. Tactics, Techniques, and Procedures (TTPs)/7. Lab - Color Coding APT 29 in ATT&CK Navigator - I.mp4
  -  45.41 MB

  ~Get Your Files Here !/2. Tactics, Techniques, and Procedures (TTPs)/8. Lab - Launching Navigator from MITRE Portal.mp4
  -  13.86 MB

  ~Get Your Files Here !/2. Tactics, Techniques, and Procedures (TTPs)/9. Lab - Adding Finance Attacks in navigator tool.mp4
  -  26.49 MB

  ~Get Your Files Here !/3. Other Learning Resources/1. Easy Difficult and Hard TTPs.mp4
  -  34.13 MB

  ~Get Your Files Here !/3. Other Learning Resources/1.1 httpsgithub.comTravisFSmithmitre_attack.html
  -  105 Bytes

  ~Get Your Files Here !/3. Other Learning Resources/2. MITRE Engenuity ATT&CK® Evaluations.mp4
  -  50.66 MB

  ~Get Your Files Here !/Bonus Resources.txt
  -  386 Bytes



Torrent Description

MITRE ATT&CK Framework Essentials

https://DevCourseWeb.com

Published 12/2023
Created by Anand Rao Nednur
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 21 Lectures ( 1h 26m ) | Size: 1.1 GB

Navigating the Cybersecurity Battlefield with MITRE

What you'll learn
Gain comprehensive knowledge about the structure and purpose of the MITRE ATT&CK Framework, including its development history and its global significance.
Learn how to identify and analyze various cyber threats using the framework’s matrix of tactics and techniques
Understand the typical behavior patterns of cyber adversaries.
iscover how to apply the MITRE ATT&CK Framework in practical scenarios such as security analysis, and enhancing cyber defense strategies.
Engage in hands-on exercises and examine real-world case studies to see how the framework is applied in actual cyber incidents and threat hunting operations.
Learn strategies to keep updated with the evolving cyber threat landscape and how to adapt the MITRE ATT&CK Framework to address new and emerging threats effect
How to use the MITRE ATT&CK Framework to customize and strengthen an organization’s specific cybersecurity measures.
Develop skills for effectively collaborating and communicating with various stakeholders in an organization, using insights from the MITRE ATT&CK Framework

Requirements
Familiarity with fundamental cybersecurity principles, terminologies, and practices is essential for grasping the more advanced concepts covered in the course.
A foundational understanding of how network and computer systems operate, including familiarity with operating systems, network architecture, and internet protocols.
Prior experience or exposure to information security practices, such as threat detection, risk assessment, or incident response, will be beneficial.
Ability to think analytically and critically, essential for understanding and applying the MITRE ATT&CK Framework in various cybersecurity scenarios.
A proactive attitude and eagerness to delve into the complexities of cybersecurity threats and defense mechanisms.
Having access to a computer with internet connectivity, and possibly permissions to use certain cybersecurity tools and software for practical exercises, if included in the course.