cyberranges.clickmeeting.com Open in urlscan Pro
51.68.187.139  Public Scan

Submitted URL: https://cyberranges88859.lt.acemlna.com/Prod/link-tracker?redirectUrl=aHR0cHMlM0ElMkYlMkZjeWJlcnJhbmdlcy5jbGlja21lZXRpbmcuY29tJTJGNTc0OT...
Effective URL: https://cyberranges.clickmeeting.com/574931444/register
Submission: On October 18 via manual from SA — Scanned from DE

Form analysis 1 forms found in the DOM

Name: registrationFormPOST

<form id="registrationForm" class="row" name="registrationForm" method="post"><input type="hidden" name="action" value="register"><input type="hidden" name="visitor_ip" value="217.114.218.19"><input type="hidden" name="visitor_http_referer"
    value=""><input type="submit" class="d-none" id="registrationSubmit">
  <fieldset class="page-around-room-form__fields page-around-room-form__fields--grey col-12">
    <div class="row">
      <section data-editor="component" class="form-group col-sm-6 js-component js-component-input">
        <div class="form-control form-required">
          <div class="f-holder f-holder--no-star"><label class="page-around-room-form__label required-label rebranding-require-star after-main-color" for="c4ca4238a0b923820dcc509a6f75849b">Vorname</label>
            <div><input class="page-around-room-form__field" type="text" name="c4ca4238a0b923820dcc509a6f75849b" id="c4ca4238a0b923820dcc509a6f75849b" placeholder="Vorname" value="" maxlength="256" data-float-placeholder="true"></div>
            <div class="field-required">Dieses Feld ist erforderlich.</div>
          </div>
        </div>
      </section>
      <section data-editor="component" class="form-group col-sm-6 js-component js-component-input">
        <div class="form-control form-required">
          <div class="f-holder f-holder--no-star"><label class="page-around-room-form__label required-label rebranding-require-star after-main-color" for="c81e728d9d4c2f636f067f89cc14862c">Nachname</label>
            <div><input class="page-around-room-form__field" type="text" name="c81e728d9d4c2f636f067f89cc14862c" id="c81e728d9d4c2f636f067f89cc14862c" placeholder="Nachname" value="" maxlength="256" data-float-placeholder="true"></div>
            <div class="field-required">Dieses Feld ist erforderlich.</div>
          </div>
        </div>
      </section>
      <section data-editor="component" class="form-group col-sm-6 js-component js-component-input">
        <div class="form-control form-required">
          <div class="f-holder f-holder--no-star"><label class="page-around-room-form__label required-label rebranding-require-star after-main-color" for="eccbc87e4b5ce2fe28308fd9f2a7baf3">E-Mail-Adresse</label>
            <div><input class="page-around-room-form__field" type="text" name="eccbc87e4b5ce2fe28308fd9f2a7baf3" id="eccbc87e4b5ce2fe28308fd9f2a7baf3" placeholder="E-Mail-Adresse" value="" maxlength="256" data-float-placeholder="true"></div>
            <div class="field-required">Dieses Feld ist erforderlich.</div>
          </div>
        </div>
      </section>
      <section data-editor="component" class="form-group col-sm-6 js-component js-component-input">
        <div class="form-control form-required">
          <div class="f-holder f-holder--no-star"><label class="page-around-room-form__label after-main-color" for="d3d9446802a44259755d38e6d163e820">Unternehmen</label>
            <div><input class="page-around-room-form__field" type="text" name="d3d9446802a44259755d38e6d163e820" id="d3d9446802a44259755d38e6d163e820" placeholder="Unternehmen" value="" maxlength="256" data-float-placeholder="true"></div>
            <div class="field-required">Dieses Feld ist erforderlich.</div>
          </div>
        </div>
      </section>
    </div>
    <div class="form-action btn-wrap">
      <div class="page-around-room-form__required rebranding-require-star">Erforderliche Felder</div> <button class="btn rebranding-bgcolor font-roboto-medium page-around-room__btn-large btn-success  effect-zoom-out" id="registrationBtn"
        type="button" data-loading="false"><span class="btn-txt">Jetzt registrieren</span><span class="spinner spinner-btn"></span></button>
    </div>
    <div id="resendContainer" class="row">
      <div class="col-12">
        <div class="text-center">
          <div class="page-around-room-form__preresend">Wenn Sie sich bereits registriert haben und die Bestätigungsmail Ihrer Registrierung nicht finden können,&nbsp;<a href="#" id="alreadyRegisteredBtn">klicken Sie bitte hier!</a>
            <div id="resendForm" class="form-inline form-inline-center" data-url="https://cyberranges.clickmeeting.com/574931444/registration_required/resend.json" style="display: none;">
              <div class="form-group required tip tip-info pos-tc mt-0 page-around-room-form__resend-box">
                <div class="tip-wrap page-around-room-form__resend-wrap">
                  <div id="resendTooltip" class="before-send-tooltip"><label class="form-label pt-2 text-nowrap" for="email">E-Mail:</label>
                    <div class="form-control">
                      <div class="f-holder" data-loading="false"><input type="text" name="email" id="email" class="shadow-none" placeholder="Hier eingeben" autocomplete="off" value=""></div>
                      <div class="resend-tip dsp-none">Die E-Mail-Adresse ist falsch. Bitte überprüfen Sie Ihre E-Mail-Adresse noch einmal.</div>
                    </div>
                    <div class="btn-wrap pr-0 pt-2 text-nowrap"> <button class="btn fR p-0 btn-link small effect-zoom-out" id="btn-resend" type="button" data-loading="false"><span class="btn-txt">Erneut senden</span><span
                          class="spinner spinner-btn"></span></button></div>
                  </div>
                  <div id="successTooltip" class="after-send-tooltip hide"><svg class="svg-stroke ico-from_email">
                      <use xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="/images/dist/icons_sprite-abbebc0b7c.svg?r=1661231558#ico_from_email"></use>
                    </svg>
                    <p>Eine Bestätigungsmail mit den Protokolldaten wurde an die angegebene E-Mail-Adresse gesendet.</p>
                  </div>
                </div>
              </div>
            </div>
          </div>
          <p class="page-around-room-form__check_connection">Systemkonfigurationstest. <a href="https://cyberranges.clickmeeting.com/mitre-att-ck-fundamentals-3-day-webinar/connection-tester" target="_blank">Hier klicken!</a></p>
        </div>
      </div>
    </div>
  </fieldset>
  <fieldset class="col-12">
    <div class="page-around-room__wrap">
      <section data-editor="component" class="page-around-room-agenda">
        <h3 class="page-around-room-agenda__title"><span class="rebranding-color"><svg class="svg-stroke ico-agenda page-around-room__svg mr-3">
              <use xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="/images/dist/icons_sprite-abbebc0b7c.svg?r=1661231558#ico_agenda"></use>
            </svg></span>Veranstaltungsplan</h3>
        <div class="event-schedule-editable page-around-room-agenda__content">
          <h3 style="text-align:center"></h3>
          <h3 style="text-align:center"><img src="https://verveindustrial.com/wp-content/uploads/2021/05/5bfdce88cd3820f7c5c21e02_mitre.png" alt="5bfdce88cd3820f7c5c21e02_mitre.png"></h3>
          <h3 style="text-align:center"><strong>MITRE ATT&amp;CK Fundamentals - 3-Day Webinar</strong></h3>
          <div><strong><br></strong></div>
          <h4 style="text-align:center"><strong>What is the MITRE ATT&amp;CK Framework?</strong></h4>
          <p>MITRE ATT&amp;CK is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&amp;CK knowledge base is used as a foundation for the development of specific threat models and
            methodologies in the private sector, in government, and in the cybersecurity product and service community.</p>
          <p><br></p>
          <h4 style="text-align:center"><strong>Why should you learn how to use the MITRE ATT&amp;CK Framework?</strong></h4>
          <p style="text-align:left">ATT&amp;CK helps you understand how attackers might operate so that you can plan and build response playbooks to mitigate attacker incidents. Armed with this knowledge and “attack playbooks” you are now better
            prepared to understand how your adversaries prepare for, launch, and execute their attacks to achieve specific desired objectives.</p>
          <p style="text-align:left">Another important use of ATT&amp;CK is to help you learn how to detect an attacker’s actions on your network. The ATT&amp;CK Framework includes resources that are purpose-built to help you develop analytics that
            detect the techniques used by attackers as they attempt to breach, explore, and exfiltrate data from your databases. ATT&amp;CK will also provide information on hacking collectives or groups and the campaigns they’ve conducted, allowing
            you to be as prepared as possible for a future attack.<br></p>
          <p>Successful and comprehensive threat detection requires understanding common adversary TTPs, that is the Tactics, Techniques, and procedures especially those that pose a threat to your organization, and how to detect and mitigate these
            attacks.</p>
          <p><br></p>
          <h4 style="text-align:center">What's Included?<br></h4>
          <div>
            <ul>
              <li>Free access to the CYBER RANGES MITRE ATT&amp;CK Fundamentals playlist for the duration of the event.</li>
              <li>Certificate of completion.</li>
              <li>Access to the official CYBER RANGES Discord server.</li>
              <li>A recorded version of the webinar sent straight to your inbox.</li>
            </ul>
          </div>
          <hr>
          <h3 style="text-align:center"><strong>Training Schedule</strong></h3>
          <div><strong><br></strong></div>
          <h4 style="text-align:center"><strong>Day 1</strong></h4>
          <ul>
            <li>Get a formal introduction to the MITRE ATT&amp;CK Framework.</li>
            <li>Understand what matrices make up the MITRE ATT&amp;CK Framework and be able to use them.</li>
            <li>Understand what tactics are and how they are used by Advanced Persistent Threat Groups (APT's).</li>
            <li>Understand what are APT (Advanced Persistent Threat) groups and how they impact the MITRE ATT&amp;CK Framework.</li>
            <li>Understand what types of Software and Malware that could be used by a defender, pen tester, red teamer, or adversary.</li>
            <li>Understand what Mitigations are and how they can be used to prevent a technique or sub-technique from being successfully executed.</li>
          </ul>
          <br>
          <h4 style="text-align:center"><strong>Day 2</strong></h4>
          <ul>
            <li style="text-align:left">Understand what the MITRE ATT&amp;CK Navigator is used for.</li>
            <li>Learn how to use the MITRE ATT&amp;CK navigator for threat hunting &amp; Cyber Threat Intelligence (CTI).</li>
            <li>Learn how to map an individual Threat Group to Navigator.</li>
            <li>Learn how to take your heatmap analysis and combine it with CTI (Cyber Threat Intelligence).</li>
          </ul>
          <div><br></div>
          <div>
            <p style="text-align:left"></p>
          </div>
          <h4 style="text-align:center"><strong>Day 3</strong></h4>
          <ul>
            <li>Learn how to use the MITRE ATT&amp;CK Framework to perform Cyber Threat Intelligence using a practical case study for an organization.</li>
            <li>Learn how to map multiple APT ( Advanced Persistent Threat ) Groups on MITRE Navigator.</li>
            <li>Learn how to analyze multiple Threat Groups and determine the priority techniques used by said groups.</li>
            <li>Learn how to use Sigma Rules within the Mitre ATT&amp;CK Framework.</li>
            <li>Map Sigma Rules to Mitre ATT&amp;CK Navigator.</li>
            <li>Using Sigma2attack.</li>
          </ul>
          <div><span><br></span></div>
          <div><span>Having trouble joining the Webinar? you can access the webinar on our YouTube channel:&nbsp;https://www.youtube.com/channel/UCnwJsmSkzBuLrxfUJKwnQyw</span></div>
        </div>
      </section>
    </div>
  </fieldset>
  <fieldset class="col-12 p-0">
    <div>
      <section data-editor="component" class=" page-around-room-presenters col-12">
        <div class="page-around-room__wrap w-100">
          <div class="page-around-room-presenters__wrap">
            <div class="event-presenter-avatar page-around-room-presenters__avatar">
              <div class="avatar-wrap">
                <div data-selector="photoContainer" class="avatar avatar-decorate large" data-loading="false"><img src="https://sc.stat-cdn.com/storage/files/66/57/1816657/presenters/1152403/96cc04b4783865f9f83e67d9d0f3bd81.png"
                    alt=""><i class="spinner spinner-avatar spinner-size-medium"></i></div>
              </div>
            </div>
            <div class="event-presenter-info event-presenter-info--tab w-100">
              <div class="event-presenter-frame w-100">
                <dl class="social">
                  <dd>
                    <p class="page-around-room-presenters__profiles">Profil ansehen auf</p>
                    <ul class="list-inline">
                      <li>
                        <a class="page-around-room__social" title="Twitter" href="http://twitter.com/chuksjonia" target="_blank"><svg class="svg-fill ico-twitter_square"><use xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="/images/dist/icons_sprite-abbebc0b7c.svg?r=1661231558#ico_twitter_square"></use></svg></a>
                      </li>
                    </ul>
                  </dd>
                </dl>
                <div class="event-presenter-header"><span class="page-around-room-presenters__position">Moderator</span>
                  <h3 class="page-around-room-presenters__name">Herr Alexis Ahmed</h3>
                </div>
              </div>
              <div class="page-around-room__desc break-word">Red Team Instructor - CYBER RANGES<div class="clearfix"></div>
              </div>
            </div>
          </div>
        </div>
      </section>
    </div>
  </fieldset>
</form>

Text Content

de
 * en
 * de
 * pl
 * it
 * es
 * fr
 * ru
 * pt


MITRE ATT&CK FUNDAMENTALS - 3-DAY WEBINAR

Datum

Montag, 17. Oktober 2022

Zeit

18:00 Africa/Nairobi

In meiner Zeitzone anzeigen
Vorname

Dieses Feld ist erforderlich.
Nachname

Dieses Feld ist erforderlich.
E-Mail-Adresse

Dieses Feld ist erforderlich.
Unternehmen

Dieses Feld ist erforderlich.
Erforderliche Felder
Jetzt registrieren
Wenn Sie sich bereits registriert haben und die Bestätigungsmail Ihrer
Registrierung nicht finden können, klicken Sie bitte hier!
E-Mail:
Die E-Mail-Adresse ist falsch. Bitte überprüfen Sie Ihre E-Mail-Adresse noch
einmal.
Erneut senden

Eine Bestätigungsmail mit den Protokolldaten wurde an die angegebene
E-Mail-Adresse gesendet.

Systemkonfigurationstest. Hier klicken!


VERANSTALTUNGSPLAN


MITRE ATT&CK FUNDAMENTALS - 3-DAY WEBINAR




WHAT IS THE MITRE ATT&CK FRAMEWORK?

MITRE ATT&CK is a globally-accessible knowledge base of adversary tactics and
techniques based on real-world observations. The ATT&CK knowledge base is used
as a foundation for the development of specific threat models and methodologies
in the private sector, in government, and in the cybersecurity product and
service community.




WHY SHOULD YOU LEARN HOW TO USE THE MITRE ATT&CK FRAMEWORK?

ATT&CK helps you understand how attackers might operate so that you can plan and
build response playbooks to mitigate attacker incidents. Armed with this
knowledge and “attack playbooks” you are now better prepared to understand how
your adversaries prepare for, launch, and execute their attacks to achieve
specific desired objectives.

Another important use of ATT&CK is to help you learn how to detect an attacker’s
actions on your network. The ATT&CK Framework includes resources that are
purpose-built to help you develop analytics that detect the techniques used by
attackers as they attempt to breach, explore, and exfiltrate data from your
databases. ATT&CK will also provide information on hacking collectives or groups
and the campaigns they’ve conducted, allowing you to be as prepared as possible
for a future attack.


Successful and comprehensive threat detection requires understanding common
adversary TTPs, that is the Tactics, Techniques, and procedures especially those
that pose a threat to your organization, and how to detect and mitigate these
attacks.




WHAT'S INCLUDED?


 * Free access to the CYBER RANGES MITRE ATT&CK Fundamentals playlist for the
   duration of the event.
 * Certificate of completion.
 * Access to the official CYBER RANGES Discord server.
 * A recorded version of the webinar sent straight to your inbox.

--------------------------------------------------------------------------------


TRAINING SCHEDULE




DAY 1

 * Get a formal introduction to the MITRE ATT&CK Framework.
 * Understand what matrices make up the MITRE ATT&CK Framework and be able to
   use them.
 * Understand what tactics are and how they are used by Advanced Persistent
   Threat Groups (APT's).
 * Understand what are APT (Advanced Persistent Threat) groups and how they
   impact the MITRE ATT&CK Framework.
 * Understand what types of Software and Malware that could be used by a
   defender, pen tester, red teamer, or adversary.
 * Understand what Mitigations are and how they can be used to prevent a
   technique or sub-technique from being successfully executed.


DAY 2

 * Understand what the MITRE ATT&CK Navigator is used for.
 * Learn how to use the MITRE ATT&CK navigator for threat hunting & Cyber Threat
   Intelligence (CTI).
 * Learn how to map an individual Threat Group to Navigator.
 * Learn how to take your heatmap analysis and combine it with CTI (Cyber Threat
   Intelligence).






DAY 3

 * Learn how to use the MITRE ATT&CK Framework to perform Cyber Threat
   Intelligence using a practical case study for an organization.
 * Learn how to map multiple APT ( Advanced Persistent Threat ) Groups on MITRE
   Navigator.
 * Learn how to analyze multiple Threat Groups and determine the priority
   techniques used by said groups.
 * Learn how to use Sigma Rules within the Mitre ATT&CK Framework.
 * Map Sigma Rules to Mitre ATT&CK Navigator.
 * Using Sigma2attack.



Having trouble joining the Webinar? you can access the webinar on our YouTube
channel: https://www.youtube.com/channel/UCnwJsmSkzBuLrxfUJKwnQyw

Profil ansehen auf

 * 

Moderator


HERR ALEXIS AHMED

Red Team Instructor - CYBER RANGES

Andere Events dieses Veranstalters ansehen

Browser-Kompatibilität. Ihr Browser ist nicht mit unserer
Audio-Video-Technologie kompatibel

Für eine reibungslose Veranstaltung empfehlen wir die Verwendung der neuesten
Versionen von Chrome, Safari, Firefox, Yandex, Opera oder Edge.

Für eine reibungslose Veranstaltung empfehlen wir die Verwendung der neuesten
Versionen von Chrome, Safari, Firefox, Yandex, Opera oder Edge.

Mehr erfahren


BROWSER-KOMPATIBILITÄT

Ihr Browser ist nicht mit unserer Audio-Video-Technologie kompatibel. Steigern
Sie die Qualität Ihrer Events für höchste Ansprüche. Aktualisieren Sie Ihren
Browser oder wechseln Sie

zu der aktuellsten Version von

Google Chrome
Mozilla Firefox
Safari
Opera
Yandex

Dieser Raum nutzt die WebRTC-Technologie, was bedeutet, dass Ihr Publikum
während Ihres Online-Events das bestmögliche Audio-Video-Erlebnis genießen kann.
Leider sind bisher nicht alle Internetbrowser mit dieser Technologie
kompatibel.Weitere Informationen finden Sie im Abschnitt FAQ in unserer
Wissensdatenbank.

Teilen dieser Inhalte!
 * 
 * 
 * 

Powered by ClickMeeting.