cyberranges.clickmeeting.com
Open in
urlscan Pro
51.68.187.139
Public Scan
Submitted URL: https://cyberranges88859.lt.acemlna.com/Prod/link-tracker?redirectUrl=aHR0cHMlM0ElMkYlMkZjeWJlcnJhbmdlcy5jbGlja21lZXRpbmcuY29tJTJGNTc0OT...
Effective URL: https://cyberranges.clickmeeting.com/574931444/register
Submission: On October 17 via manual from IN — Scanned from DE
Effective URL: https://cyberranges.clickmeeting.com/574931444/register
Submission: On October 17 via manual from IN — Scanned from DE
Form analysis
1 forms found in the DOMName: registrationForm — POST
<form id="registrationForm" class="row" name="registrationForm" method="post"><input type="hidden" name="action" value="register"><input type="hidden" name="visitor_ip" value="217.64.151.69"><input type="hidden" name="visitor_http_referer"
value=""><input type="submit" class="d-none" id="registrationSubmit">
<fieldset class="page-around-room-form__fields page-around-room-form__fields--grey col-12">
<div class="row">
<section data-editor="component" class="form-group col-sm-6 js-component js-component-input">
<div class="form-control form-required">
<div class="f-holder f-holder--no-star"><label class="page-around-room-form__label required-label rebranding-require-star after-main-color" for="c4ca4238a0b923820dcc509a6f75849b">Name</label>
<div><input class="page-around-room-form__field" type="text" name="c4ca4238a0b923820dcc509a6f75849b" id="c4ca4238a0b923820dcc509a6f75849b" placeholder="Name" value="" maxlength="256" data-float-placeholder="true"></div>
<div class="field-required">This field is required.</div>
</div>
</div>
</section>
<section data-editor="component" class="form-group col-sm-6 js-component js-component-input">
<div class="form-control form-required">
<div class="f-holder f-holder--no-star"><label class="page-around-room-form__label required-label rebranding-require-star after-main-color" for="c81e728d9d4c2f636f067f89cc14862c">Last Name</label>
<div><input class="page-around-room-form__field" type="text" name="c81e728d9d4c2f636f067f89cc14862c" id="c81e728d9d4c2f636f067f89cc14862c" placeholder="Last Name" value="" maxlength="256" data-float-placeholder="true"></div>
<div class="field-required">This field is required.</div>
</div>
</div>
</section>
<section data-editor="component" class="form-group col-sm-6 js-component js-component-input">
<div class="form-control form-required">
<div class="f-holder f-holder--no-star"><label class="page-around-room-form__label required-label rebranding-require-star after-main-color" for="eccbc87e4b5ce2fe28308fd9f2a7baf3">Email Address</label>
<div><input class="page-around-room-form__field" type="text" name="eccbc87e4b5ce2fe28308fd9f2a7baf3" id="eccbc87e4b5ce2fe28308fd9f2a7baf3" placeholder="Email Address" value="" maxlength="256" data-float-placeholder="true"></div>
<div class="field-required">This field is required.</div>
</div>
</div>
</section>
<section data-editor="component" class="form-group col-sm-6 js-component js-component-input">
<div class="form-control form-required">
<div class="f-holder f-holder--no-star"><label class="page-around-room-form__label after-main-color" for="d3d9446802a44259755d38e6d163e820">Company</label>
<div><input class="page-around-room-form__field" type="text" name="d3d9446802a44259755d38e6d163e820" id="d3d9446802a44259755d38e6d163e820" placeholder="Company" value="" maxlength="256" data-float-placeholder="true"></div>
<div class="field-required">This field is required.</div>
</div>
</div>
</section>
</div>
<div class="form-action btn-wrap">
<div class="page-around-room-form__required rebranding-require-star">Required fields</div> <button class="btn rebranding-bgcolor font-roboto-medium page-around-room__btn-large btn-success effect-zoom-out" id="registrationBtn" type="button"
data-loading="false"><span class="btn-txt">Register now</span><span class="spinner spinner-btn"></span></button>
</div>
<div id="resendContainer" class="row">
<div class="col-12">
<div class="text-center">
<div class="page-around-room-form__preresend">If you have already registered and can't locate your registration confirmation email, <a href="#" id="alreadyRegisteredBtn">click here!</a>
<div id="resendForm" class="form-inline form-inline-center" data-url="https://cyberranges.clickmeeting.com/574931444/registration_required/resend.json" style="display: none;">
<div class="form-group required tip tip-info pos-tc mt-0 page-around-room-form__resend-box">
<div class="tip-wrap page-around-room-form__resend-wrap">
<div id="resendTooltip" class="before-send-tooltip"><label class="form-label pt-2 text-nowrap" for="email">E-mail:</label>
<div class="form-control">
<div class="f-holder" data-loading="false"><input type="text" name="email" id="email" class="shadow-none" placeholder="Type here" autocomplete="off" value=""></div>
<div class="resend-tip dsp-none">The email address is incorrect. Please double-check your email address.</div>
</div>
<div class="btn-wrap pr-0 pt-2 text-nowrap"> <button class="btn fR p-0 btn-link small effect-zoom-out" id="btn-resend" type="button" data-loading="false"><span class="btn-txt">Resend</span><span
class="spinner spinner-btn"></span></button></div>
</div>
<div id="successTooltip" class="after-send-tooltip hide"><svg class="svg-stroke ico-from_email">
<use xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="/images/dist/icons_sprite-abbebc0b7c.svg?r=1661231558#ico_from_email"></use>
</svg>
<p>A confirmation email with logging details has been sent to the provided email.</p>
</div>
</div>
</div>
</div>
</div>
<p class="page-around-room-form__check_connection">System configuration test. <a href="https://cyberranges.clickmeeting.com/mitre-att-ck-fundamentals-3-day-webinar/connection-tester" target="_blank">Click here!</a></p>
</div>
</div>
</div>
</fieldset>
<fieldset class="col-12">
<div class="page-around-room__wrap">
<section data-editor="component" class="page-around-room-agenda">
<h3 class="page-around-room-agenda__title"><span class="rebranding-color"><svg class="svg-stroke ico-agenda page-around-room__svg mr-3">
<use xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="/images/dist/icons_sprite-abbebc0b7c.svg?r=1661231558#ico_agenda"></use>
</svg></span>Agenda</h3>
<div class="event-schedule-editable page-around-room-agenda__content">
<h3 style="text-align:center"></h3>
<h3 style="text-align:center"><img src="https://verveindustrial.com/wp-content/uploads/2021/05/5bfdce88cd3820f7c5c21e02_mitre.png" alt="5bfdce88cd3820f7c5c21e02_mitre.png"></h3>
<h3 style="text-align:center"><strong>MITRE ATT&CK Fundamentals - 3-Day Webinar</strong></h3>
<div><strong><br></strong></div>
<h4 style="text-align:center"><strong>What is the MITRE ATT&CK Framework?</strong></h4>
<p>MITRE ATT&CK is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and
methodologies in the private sector, in government, and in the cybersecurity product and service community.</p>
<p><br></p>
<h4 style="text-align:center"><strong>Why should you learn how to use the MITRE ATT&CK Framework?</strong></h4>
<p style="text-align:left">ATT&CK helps you understand how attackers might operate so that you can plan and build response playbooks to mitigate attacker incidents. Armed with this knowledge and “attack playbooks” you are now better
prepared to understand how your adversaries prepare for, launch, and execute their attacks to achieve specific desired objectives.</p>
<p style="text-align:left">Another important use of ATT&CK is to help you learn how to detect an attacker’s actions on your network. The ATT&CK Framework includes resources that are purpose-built to help you develop analytics that
detect the techniques used by attackers as they attempt to breach, explore, and exfiltrate data from your databases. ATT&CK will also provide information on hacking collectives or groups and the campaigns they’ve conducted, allowing
you to be as prepared as possible for a future attack.<br></p>
<p>Successful and comprehensive threat detection requires understanding common adversary TTPs, that is the Tactics, Techniques, and procedures especially those that pose a threat to your organization, and how to detect and mitigate these
attacks.</p>
<p><br></p>
<h4 style="text-align:center">What's Included?<br></h4>
<div>
<ul>
<li>Free access to the CYBER RANGES MITRE ATT&CK Fundamentals playlist for the duration of the event.</li>
<li>Certificate of completion.</li>
<li>Access to the official CYBER RANGES Discord server.</li>
<li>A recorded version of the webinar sent straight to your inbox.</li>
</ul>
</div>
<hr>
<h3 style="text-align:center"><strong>Training Schedule</strong></h3>
<div><strong><br></strong></div>
<h4 style="text-align:center"><strong>Day 1</strong></h4>
<ul>
<li>Get a formal introduction to the MITRE ATT&CK Framework.</li>
<li>Understand what matrices make up the MITRE ATT&CK Framework and be able to use them.</li>
<li>Understand what tactics are and how they are used by Advanced Persistent Threat Groups (APT's).</li>
<li>Understand what are APT (Advanced Persistent Threat) groups and how they impact the MITRE ATT&CK Framework.</li>
<li>Understand what types of Software and Malware that could be used by a defender, pen tester, red teamer, or adversary.</li>
<li>Understand what Mitigations are and how they can be used to prevent a technique or sub-technique from being successfully executed.</li>
</ul>
<br>
<h4 style="text-align:center"><strong>Day 2</strong></h4>
<ul>
<li style="text-align:left">Understand what the MITRE ATT&CK Navigator is used for.</li>
<li>Learn how to use the MITRE ATT&CK navigator for threat hunting & Cyber Threat Intelligence (CTI).</li>
<li>Learn how to map an individual Threat Group to Navigator.</li>
<li>Learn how to take your heatmap analysis and combine it with CTI (Cyber Threat Intelligence).</li>
</ul>
<div><br></div>
<div>
<p style="text-align:left"></p>
</div>
<h4 style="text-align:center"><strong>Day 3</strong></h4>
<ul>
<li>Learn how to use the MITRE ATT&CK Framework to perform Cyber Threat Intelligence using a practical case study for an organization.</li>
<li>Learn how to map multiple APT ( Advanced Persistent Threat ) Groups on MITRE Navigator.</li>
<li>Learn how to analyze multiple Threat Groups and determine the priority techniques used by said groups.</li>
<li>Learn how to use Sigma Rules within the Mitre ATT&CK Framework.</li>
<li>Map Sigma Rules to Mitre ATT&CK Navigator.</li>
<li>Using Sigma2attack.</li>
</ul>
<div><span><br></span></div>
<div><span>Having trouble joining the Webinar? you can access the webinar on our YouTube channel: https://www.youtube.com/channel/UCnwJsmSkzBuLrxfUJKwnQyw</span></div>
</div>
</section>
</div>
</fieldset>
<fieldset class="col-12 p-0">
<div>
<section data-editor="component" class=" page-around-room-presenters col-12">
<div class="page-around-room__wrap w-100">
<div class="page-around-room-presenters__wrap">
<div class="event-presenter-avatar page-around-room-presenters__avatar">
<div class="avatar-wrap">
<div data-selector="photoContainer" class="avatar avatar-decorate large" data-loading="false"><img src="https://sc.stat-cdn.com/storage/files/66/57/1816657/presenters/1152403/96cc04b4783865f9f83e67d9d0f3bd81.png"
alt=""><i class="spinner spinner-avatar spinner-size-medium"></i></div>
</div>
</div>
<div class="event-presenter-info event-presenter-info--tab w-100">
<div class="event-presenter-frame w-100">
<dl class="social">
<dd>
<p class="page-around-room-presenters__profiles">View profile on</p>
<ul class="list-inline">
<li>
<a class="page-around-room__social" title="Twitter" href="http://twitter.com/chuksjonia" target="_blank"><svg class="svg-fill ico-twitter_square"><use xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="/images/dist/icons_sprite-abbebc0b7c.svg?r=1661231558#ico_twitter_square"></use></svg></a>
</li>
</ul>
</dd>
</dl>
<div class="event-presenter-header"><span class="page-around-room-presenters__position">Presenter</span>
<h3 class="page-around-room-presenters__name">Mr Alexis Ahmed</h3>
</div>
</div>
<div class="page-around-room__desc break-word">Red Team Instructor - CYBER RANGES<div class="clearfix"></div>
</div>
</div>
</div>
</div>
</section>
</div>
</fieldset>
</form>
Text Content
en * en * de * pl * it * es * fr * ru * pt MITRE ATT&CK FUNDAMENTALS - 3-DAY WEBINAR Date Monday, October 17, 2022 Time 06:00 PM Africa/Nairobi Convert to my timezone Name This field is required. Last Name This field is required. Email Address This field is required. Company This field is required. Required fields Register now If you have already registered and can't locate your registration confirmation email, click here! E-mail: The email address is incorrect. Please double-check your email address. Resend A confirmation email with logging details has been sent to the provided email. System configuration test. Click here! AGENDA MITRE ATT&CK FUNDAMENTALS - 3-DAY WEBINAR WHAT IS THE MITRE ATT&CK FRAMEWORK? MITRE ATT&CK is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community. WHY SHOULD YOU LEARN HOW TO USE THE MITRE ATT&CK FRAMEWORK? ATT&CK helps you understand how attackers might operate so that you can plan and build response playbooks to mitigate attacker incidents. Armed with this knowledge and “attack playbooks” you are now better prepared to understand how your adversaries prepare for, launch, and execute their attacks to achieve specific desired objectives. Another important use of ATT&CK is to help you learn how to detect an attacker’s actions on your network. The ATT&CK Framework includes resources that are purpose-built to help you develop analytics that detect the techniques used by attackers as they attempt to breach, explore, and exfiltrate data from your databases. ATT&CK will also provide information on hacking collectives or groups and the campaigns they’ve conducted, allowing you to be as prepared as possible for a future attack. Successful and comprehensive threat detection requires understanding common adversary TTPs, that is the Tactics, Techniques, and procedures especially those that pose a threat to your organization, and how to detect and mitigate these attacks. WHAT'S INCLUDED? * Free access to the CYBER RANGES MITRE ATT&CK Fundamentals playlist for the duration of the event. * Certificate of completion. * Access to the official CYBER RANGES Discord server. * A recorded version of the webinar sent straight to your inbox. -------------------------------------------------------------------------------- TRAINING SCHEDULE DAY 1 * Get a formal introduction to the MITRE ATT&CK Framework. * Understand what matrices make up the MITRE ATT&CK Framework and be able to use them. * Understand what tactics are and how they are used by Advanced Persistent Threat Groups (APT's). * Understand what are APT (Advanced Persistent Threat) groups and how they impact the MITRE ATT&CK Framework. * Understand what types of Software and Malware that could be used by a defender, pen tester, red teamer, or adversary. * Understand what Mitigations are and how they can be used to prevent a technique or sub-technique from being successfully executed. DAY 2 * Understand what the MITRE ATT&CK Navigator is used for. * Learn how to use the MITRE ATT&CK navigator for threat hunting & Cyber Threat Intelligence (CTI). * Learn how to map an individual Threat Group to Navigator. * Learn how to take your heatmap analysis and combine it with CTI (Cyber Threat Intelligence). DAY 3 * Learn how to use the MITRE ATT&CK Framework to perform Cyber Threat Intelligence using a practical case study for an organization. * Learn how to map multiple APT ( Advanced Persistent Threat ) Groups on MITRE Navigator. * Learn how to analyze multiple Threat Groups and determine the priority techniques used by said groups. * Learn how to use Sigma Rules within the Mitre ATT&CK Framework. * Map Sigma Rules to Mitre ATT&CK Navigator. * Using Sigma2attack. Having trouble joining the Webinar? you can access the webinar on our YouTube channel: https://www.youtube.com/channel/UCnwJsmSkzBuLrxfUJKwnQyw View profile on * Presenter MR ALEXIS AHMED Red Team Instructor - CYBER RANGES See other events from this host Browser compatibility. Your browser is not compatible with our audio-video technology For a flawless experience, we highly recommend using the latest version of Chrome, Safari, Firefox, Yandex, Opera, or Edge browser . For a flawless experience, we highly recommend using the latest version of Chrome, Safari, Firefox, Yandex, Opera, or Edge browser . Learn more BROWSER COMPATIBILITY Your browser is not compatible with our audio-video technology. Raise your event quality to the highest standard. Upgrade your browser or switch to the latest versions of Google Chrome Mozilla Firefox Safari Opera Yandex This room is using WebRTC technology, meaning that your audience will experience the best possible audio-video during your online event. Unfortunately, not all internet browsers are compatible with this technology at the moment. For more information, go to the FAQ section in our Knowledge Base. Share this page! * * * Powered by ClickMeeting Webinar Software.