Price: 6.00 USD | Size: 1.54 GB | Duration : 10 Hours | 80+ Video Lessons | ⭐️⭐️⭐️⭐️⭐️ 4.8
BRAND : Expert TRAINING | ENGLISH | Bonus : Blue Team PDF Guides | INSTANT DOWNLOAD
HOW TO DOWNLOAD THIS COURSE?
You can Instant Download a PDF file After successful payment, This PDF File Contains Course Download links
You can Download This Course immediately from the click that Links
Blue Team Tools Course & PDF Guides
MITRE ATT&CK® is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community. With the addition of MITRE Shield, you now have a 360 degree view of attack scenarios and the data and capabilities needed to stop them.
Our blue team tooling courses focus on the use of a specific industry-standard, open source tool to protect, detect, and respond against targeted threat actor techniques in an enterprise environment. Knowing what a tool is and how it can be integrated into your overall enterprise security strategy will ultimately lend to your ability as an organization or an individual to defend against specific adversary activity.
Courses in this path
Introduction
The first course in this series discusses the use of open source, blue team tools to fill the gaps in your enterprise security, in turn, enable your information security organization to evolve their capabilities as fast as the threat actors you are defending against.
Blue Team Tools: Defense against Adversary Activity Using MITRE Techniques
19mDuration
Network Analysis
In this section, you will learn about the tools associated with network analysis to detect related data source TTPs and actively meet the adversary's activity with a response before you encounter it.
Network Analysis with Arkime
45mDuration
Network Analysis with pfSense
38mDuration
OS Analysis
In this section, you will learn about the tools associated with OS analysis to detect related data source TTPs and actively meet the adversary's activity with a response before you encounter it.
top of page
Related Courses
SKU: EXTRS0072
$6.00Price
bottom of page