cyberranges.clickmeeting.com
Open in
urlscan Pro
51.68.187.139
Public Scan
Submitted URL: https://cyberranges88859.lt.acemlna.com/Prod/link-tracker?redirectUrl=aHR0cHMlM0ElMkYlMkZjeWJlcnJhbmdlcy5jbGlja21lZXRpbmcuY29tJTJGNTc0OT...
Effective URL: https://cyberranges.clickmeeting.com/574931444/register
Submission: On October 18 via manual from SA — Scanned from DE
Effective URL: https://cyberranges.clickmeeting.com/574931444/register
Submission: On October 18 via manual from SA — Scanned from DE
Form analysis
1 forms found in the DOMName: registrationForm — POST
<form id="registrationForm" class="row" name="registrationForm" method="post"><input type="hidden" name="action" value="register"><input type="hidden" name="visitor_ip" value="217.114.218.19"><input type="hidden" name="visitor_http_referer"
value=""><input type="submit" class="d-none" id="registrationSubmit">
<fieldset class="page-around-room-form__fields page-around-room-form__fields--grey col-12">
<div class="row">
<section data-editor="component" class="form-group col-sm-6 js-component js-component-input">
<div class="form-control form-required">
<div class="f-holder f-holder--no-star"><label class="page-around-room-form__label required-label rebranding-require-star after-main-color" for="c4ca4238a0b923820dcc509a6f75849b">Vorname</label>
<div><input class="page-around-room-form__field" type="text" name="c4ca4238a0b923820dcc509a6f75849b" id="c4ca4238a0b923820dcc509a6f75849b" placeholder="Vorname" value="" maxlength="256" data-float-placeholder="true"></div>
<div class="field-required">Dieses Feld ist erforderlich.</div>
</div>
</div>
</section>
<section data-editor="component" class="form-group col-sm-6 js-component js-component-input">
<div class="form-control form-required">
<div class="f-holder f-holder--no-star"><label class="page-around-room-form__label required-label rebranding-require-star after-main-color" for="c81e728d9d4c2f636f067f89cc14862c">Nachname</label>
<div><input class="page-around-room-form__field" type="text" name="c81e728d9d4c2f636f067f89cc14862c" id="c81e728d9d4c2f636f067f89cc14862c" placeholder="Nachname" value="" maxlength="256" data-float-placeholder="true"></div>
<div class="field-required">Dieses Feld ist erforderlich.</div>
</div>
</div>
</section>
<section data-editor="component" class="form-group col-sm-6 js-component js-component-input">
<div class="form-control form-required">
<div class="f-holder f-holder--no-star"><label class="page-around-room-form__label required-label rebranding-require-star after-main-color" for="eccbc87e4b5ce2fe28308fd9f2a7baf3">E-Mail-Adresse</label>
<div><input class="page-around-room-form__field" type="text" name="eccbc87e4b5ce2fe28308fd9f2a7baf3" id="eccbc87e4b5ce2fe28308fd9f2a7baf3" placeholder="E-Mail-Adresse" value="" maxlength="256" data-float-placeholder="true"></div>
<div class="field-required">Dieses Feld ist erforderlich.</div>
</div>
</div>
</section>
<section data-editor="component" class="form-group col-sm-6 js-component js-component-input">
<div class="form-control form-required">
<div class="f-holder f-holder--no-star"><label class="page-around-room-form__label after-main-color" for="d3d9446802a44259755d38e6d163e820">Unternehmen</label>
<div><input class="page-around-room-form__field" type="text" name="d3d9446802a44259755d38e6d163e820" id="d3d9446802a44259755d38e6d163e820" placeholder="Unternehmen" value="" maxlength="256" data-float-placeholder="true"></div>
<div class="field-required">Dieses Feld ist erforderlich.</div>
</div>
</div>
</section>
</div>
<div class="form-action btn-wrap">
<div class="page-around-room-form__required rebranding-require-star">Erforderliche Felder</div> <button class="btn rebranding-bgcolor font-roboto-medium page-around-room__btn-large btn-success effect-zoom-out" id="registrationBtn"
type="button" data-loading="false"><span class="btn-txt">Jetzt registrieren</span><span class="spinner spinner-btn"></span></button>
</div>
<div id="resendContainer" class="row">
<div class="col-12">
<div class="text-center">
<div class="page-around-room-form__preresend">Wenn Sie sich bereits registriert haben und die Bestätigungsmail Ihrer Registrierung nicht finden können, <a href="#" id="alreadyRegisteredBtn">klicken Sie bitte hier!</a>
<div id="resendForm" class="form-inline form-inline-center" data-url="https://cyberranges.clickmeeting.com/574931444/registration_required/resend.json" style="display: none;">
<div class="form-group required tip tip-info pos-tc mt-0 page-around-room-form__resend-box">
<div class="tip-wrap page-around-room-form__resend-wrap">
<div id="resendTooltip" class="before-send-tooltip"><label class="form-label pt-2 text-nowrap" for="email">E-Mail:</label>
<div class="form-control">
<div class="f-holder" data-loading="false"><input type="text" name="email" id="email" class="shadow-none" placeholder="Hier eingeben" autocomplete="off" value=""></div>
<div class="resend-tip dsp-none">Die E-Mail-Adresse ist falsch. Bitte überprüfen Sie Ihre E-Mail-Adresse noch einmal.</div>
</div>
<div class="btn-wrap pr-0 pt-2 text-nowrap"> <button class="btn fR p-0 btn-link small effect-zoom-out" id="btn-resend" type="button" data-loading="false"><span class="btn-txt">Erneut senden</span><span
class="spinner spinner-btn"></span></button></div>
</div>
<div id="successTooltip" class="after-send-tooltip hide"><svg class="svg-stroke ico-from_email">
<use xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="/images/dist/icons_sprite-abbebc0b7c.svg?r=1661231558#ico_from_email"></use>
</svg>
<p>Eine Bestätigungsmail mit den Protokolldaten wurde an die angegebene E-Mail-Adresse gesendet.</p>
</div>
</div>
</div>
</div>
</div>
<p class="page-around-room-form__check_connection">Systemkonfigurationstest. <a href="https://cyberranges.clickmeeting.com/mitre-att-ck-fundamentals-3-day-webinar/connection-tester" target="_blank">Hier klicken!</a></p>
</div>
</div>
</div>
</fieldset>
<fieldset class="col-12">
<div class="page-around-room__wrap">
<section data-editor="component" class="page-around-room-agenda">
<h3 class="page-around-room-agenda__title"><span class="rebranding-color"><svg class="svg-stroke ico-agenda page-around-room__svg mr-3">
<use xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="/images/dist/icons_sprite-abbebc0b7c.svg?r=1661231558#ico_agenda"></use>
</svg></span>Veranstaltungsplan</h3>
<div class="event-schedule-editable page-around-room-agenda__content">
<h3 style="text-align:center"></h3>
<h3 style="text-align:center"><img src="https://verveindustrial.com/wp-content/uploads/2021/05/5bfdce88cd3820f7c5c21e02_mitre.png" alt="5bfdce88cd3820f7c5c21e02_mitre.png"></h3>
<h3 style="text-align:center"><strong>MITRE ATT&CK Fundamentals - 3-Day Webinar</strong></h3>
<div><strong><br></strong></div>
<h4 style="text-align:center"><strong>What is the MITRE ATT&CK Framework?</strong></h4>
<p>MITRE ATT&CK is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and
methodologies in the private sector, in government, and in the cybersecurity product and service community.</p>
<p><br></p>
<h4 style="text-align:center"><strong>Why should you learn how to use the MITRE ATT&CK Framework?</strong></h4>
<p style="text-align:left">ATT&CK helps you understand how attackers might operate so that you can plan and build response playbooks to mitigate attacker incidents. Armed with this knowledge and “attack playbooks” you are now better
prepared to understand how your adversaries prepare for, launch, and execute their attacks to achieve specific desired objectives.</p>
<p style="text-align:left">Another important use of ATT&CK is to help you learn how to detect an attacker’s actions on your network. The ATT&CK Framework includes resources that are purpose-built to help you develop analytics that
detect the techniques used by attackers as they attempt to breach, explore, and exfiltrate data from your databases. ATT&CK will also provide information on hacking collectives or groups and the campaigns they’ve conducted, allowing
you to be as prepared as possible for a future attack.<br></p>
<p>Successful and comprehensive threat detection requires understanding common adversary TTPs, that is the Tactics, Techniques, and procedures especially those that pose a threat to your organization, and how to detect and mitigate these
attacks.</p>
<p><br></p>
<h4 style="text-align:center">What's Included?<br></h4>
<div>
<ul>
<li>Free access to the CYBER RANGES MITRE ATT&CK Fundamentals playlist for the duration of the event.</li>
<li>Certificate of completion.</li>
<li>Access to the official CYBER RANGES Discord server.</li>
<li>A recorded version of the webinar sent straight to your inbox.</li>
</ul>
</div>
<hr>
<h3 style="text-align:center"><strong>Training Schedule</strong></h3>
<div><strong><br></strong></div>
<h4 style="text-align:center"><strong>Day 1</strong></h4>
<ul>
<li>Get a formal introduction to the MITRE ATT&CK Framework.</li>
<li>Understand what matrices make up the MITRE ATT&CK Framework and be able to use them.</li>
<li>Understand what tactics are and how they are used by Advanced Persistent Threat Groups (APT's).</li>
<li>Understand what are APT (Advanced Persistent Threat) groups and how they impact the MITRE ATT&CK Framework.</li>
<li>Understand what types of Software and Malware that could be used by a defender, pen tester, red teamer, or adversary.</li>
<li>Understand what Mitigations are and how they can be used to prevent a technique or sub-technique from being successfully executed.</li>
</ul>
<br>
<h4 style="text-align:center"><strong>Day 2</strong></h4>
<ul>
<li style="text-align:left">Understand what the MITRE ATT&CK Navigator is used for.</li>
<li>Learn how to use the MITRE ATT&CK navigator for threat hunting & Cyber Threat Intelligence (CTI).</li>
<li>Learn how to map an individual Threat Group to Navigator.</li>
<li>Learn how to take your heatmap analysis and combine it with CTI (Cyber Threat Intelligence).</li>
</ul>
<div><br></div>
<div>
<p style="text-align:left"></p>
</div>
<h4 style="text-align:center"><strong>Day 3</strong></h4>
<ul>
<li>Learn how to use the MITRE ATT&CK Framework to perform Cyber Threat Intelligence using a practical case study for an organization.</li>
<li>Learn how to map multiple APT ( Advanced Persistent Threat ) Groups on MITRE Navigator.</li>
<li>Learn how to analyze multiple Threat Groups and determine the priority techniques used by said groups.</li>
<li>Learn how to use Sigma Rules within the Mitre ATT&CK Framework.</li>
<li>Map Sigma Rules to Mitre ATT&CK Navigator.</li>
<li>Using Sigma2attack.</li>
</ul>
<div><span><br></span></div>
<div><span>Having trouble joining the Webinar? you can access the webinar on our YouTube channel: https://www.youtube.com/channel/UCnwJsmSkzBuLrxfUJKwnQyw</span></div>
</div>
</section>
</div>
</fieldset>
<fieldset class="col-12 p-0">
<div>
<section data-editor="component" class=" page-around-room-presenters col-12">
<div class="page-around-room__wrap w-100">
<div class="page-around-room-presenters__wrap">
<div class="event-presenter-avatar page-around-room-presenters__avatar">
<div class="avatar-wrap">
<div data-selector="photoContainer" class="avatar avatar-decorate large" data-loading="false"><img src="https://sc.stat-cdn.com/storage/files/66/57/1816657/presenters/1152403/96cc04b4783865f9f83e67d9d0f3bd81.png"
alt=""><i class="spinner spinner-avatar spinner-size-medium"></i></div>
</div>
</div>
<div class="event-presenter-info event-presenter-info--tab w-100">
<div class="event-presenter-frame w-100">
<dl class="social">
<dd>
<p class="page-around-room-presenters__profiles">Profil ansehen auf</p>
<ul class="list-inline">
<li>
<a class="page-around-room__social" title="Twitter" href="http://twitter.com/chuksjonia" target="_blank"><svg class="svg-fill ico-twitter_square"><use xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="/images/dist/icons_sprite-abbebc0b7c.svg?r=1661231558#ico_twitter_square"></use></svg></a>
</li>
</ul>
</dd>
</dl>
<div class="event-presenter-header"><span class="page-around-room-presenters__position">Moderator</span>
<h3 class="page-around-room-presenters__name">Herr Alexis Ahmed</h3>
</div>
</div>
<div class="page-around-room__desc break-word">Red Team Instructor - CYBER RANGES<div class="clearfix"></div>
</div>
</div>
</div>
</div>
</section>
</div>
</fieldset>
</form>
Text Content
de * en * de * pl * it * es * fr * ru * pt MITRE ATT&CK FUNDAMENTALS - 3-DAY WEBINAR Datum Montag, 17. Oktober 2022 Zeit 18:00 Africa/Nairobi In meiner Zeitzone anzeigen Vorname Dieses Feld ist erforderlich. Nachname Dieses Feld ist erforderlich. E-Mail-Adresse Dieses Feld ist erforderlich. Unternehmen Dieses Feld ist erforderlich. Erforderliche Felder Jetzt registrieren Wenn Sie sich bereits registriert haben und die Bestätigungsmail Ihrer Registrierung nicht finden können, klicken Sie bitte hier! E-Mail: Die E-Mail-Adresse ist falsch. Bitte überprüfen Sie Ihre E-Mail-Adresse noch einmal. Erneut senden Eine Bestätigungsmail mit den Protokolldaten wurde an die angegebene E-Mail-Adresse gesendet. Systemkonfigurationstest. Hier klicken! VERANSTALTUNGSPLAN MITRE ATT&CK FUNDAMENTALS - 3-DAY WEBINAR WHAT IS THE MITRE ATT&CK FRAMEWORK? MITRE ATT&CK is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community. WHY SHOULD YOU LEARN HOW TO USE THE MITRE ATT&CK FRAMEWORK? ATT&CK helps you understand how attackers might operate so that you can plan and build response playbooks to mitigate attacker incidents. Armed with this knowledge and “attack playbooks” you are now better prepared to understand how your adversaries prepare for, launch, and execute their attacks to achieve specific desired objectives. Another important use of ATT&CK is to help you learn how to detect an attacker’s actions on your network. The ATT&CK Framework includes resources that are purpose-built to help you develop analytics that detect the techniques used by attackers as they attempt to breach, explore, and exfiltrate data from your databases. ATT&CK will also provide information on hacking collectives or groups and the campaigns they’ve conducted, allowing you to be as prepared as possible for a future attack. Successful and comprehensive threat detection requires understanding common adversary TTPs, that is the Tactics, Techniques, and procedures especially those that pose a threat to your organization, and how to detect and mitigate these attacks. WHAT'S INCLUDED? * Free access to the CYBER RANGES MITRE ATT&CK Fundamentals playlist for the duration of the event. * Certificate of completion. * Access to the official CYBER RANGES Discord server. * A recorded version of the webinar sent straight to your inbox. -------------------------------------------------------------------------------- TRAINING SCHEDULE DAY 1 * Get a formal introduction to the MITRE ATT&CK Framework. * Understand what matrices make up the MITRE ATT&CK Framework and be able to use them. * Understand what tactics are and how they are used by Advanced Persistent Threat Groups (APT's). * Understand what are APT (Advanced Persistent Threat) groups and how they impact the MITRE ATT&CK Framework. * Understand what types of Software and Malware that could be used by a defender, pen tester, red teamer, or adversary. * Understand what Mitigations are and how they can be used to prevent a technique or sub-technique from being successfully executed. DAY 2 * Understand what the MITRE ATT&CK Navigator is used for. * Learn how to use the MITRE ATT&CK navigator for threat hunting & Cyber Threat Intelligence (CTI). * Learn how to map an individual Threat Group to Navigator. * Learn how to take your heatmap analysis and combine it with CTI (Cyber Threat Intelligence). DAY 3 * Learn how to use the MITRE ATT&CK Framework to perform Cyber Threat Intelligence using a practical case study for an organization. * Learn how to map multiple APT ( Advanced Persistent Threat ) Groups on MITRE Navigator. * Learn how to analyze multiple Threat Groups and determine the priority techniques used by said groups. * Learn how to use Sigma Rules within the Mitre ATT&CK Framework. * Map Sigma Rules to Mitre ATT&CK Navigator. * Using Sigma2attack. Having trouble joining the Webinar? you can access the webinar on our YouTube channel: https://www.youtube.com/channel/UCnwJsmSkzBuLrxfUJKwnQyw Profil ansehen auf * Moderator HERR ALEXIS AHMED Red Team Instructor - CYBER RANGES Andere Events dieses Veranstalters ansehen Browser-Kompatibilität. Ihr Browser ist nicht mit unserer Audio-Video-Technologie kompatibel Für eine reibungslose Veranstaltung empfehlen wir die Verwendung der neuesten Versionen von Chrome, Safari, Firefox, Yandex, Opera oder Edge. Für eine reibungslose Veranstaltung empfehlen wir die Verwendung der neuesten Versionen von Chrome, Safari, Firefox, Yandex, Opera oder Edge. Mehr erfahren BROWSER-KOMPATIBILITÄT Ihr Browser ist nicht mit unserer Audio-Video-Technologie kompatibel. Steigern Sie die Qualität Ihrer Events für höchste Ansprüche. Aktualisieren Sie Ihren Browser oder wechseln Sie zu der aktuellsten Version von Google Chrome Mozilla Firefox Safari Opera Yandex Dieser Raum nutzt die WebRTC-Technologie, was bedeutet, dass Ihr Publikum während Ihres Online-Events das bestmögliche Audio-Video-Erlebnis genießen kann. Leider sind bisher nicht alle Internetbrowser mit dieser Technologie kompatibel.Weitere Informationen finden Sie im Abschnitt FAQ in unserer Wissensdatenbank. Teilen dieser Inhalte! * * * Powered by ClickMeeting.