cyberranges.clickmeeting.com Open in urlscan Pro
51.68.187.139  Public Scan

Submitted URL: https://cyberranges88859.lt.acemlna.com/Prod/link-tracker?redirectUrl=aHR0cHMlM0ElMkYlMkZjeWJlcnJhbmdlcy5jbGlja21lZXRpbmcuY29tJTJGNTc0OT...
Effective URL: https://cyberranges.clickmeeting.com/574931444/register
Submission: On October 17 via manual from IN — Scanned from DE

Form analysis 1 forms found in the DOM

Name: registrationFormPOST

<form id="registrationForm" class="row" name="registrationForm" method="post"><input type="hidden" name="action" value="register"><input type="hidden" name="visitor_ip" value="217.64.151.69"><input type="hidden" name="visitor_http_referer"
    value=""><input type="submit" class="d-none" id="registrationSubmit">
  <fieldset class="page-around-room-form__fields page-around-room-form__fields--grey col-12">
    <div class="row">
      <section data-editor="component" class="form-group col-sm-6 js-component js-component-input">
        <div class="form-control form-required">
          <div class="f-holder f-holder--no-star"><label class="page-around-room-form__label required-label rebranding-require-star after-main-color" for="c4ca4238a0b923820dcc509a6f75849b">Name</label>
            <div><input class="page-around-room-form__field" type="text" name="c4ca4238a0b923820dcc509a6f75849b" id="c4ca4238a0b923820dcc509a6f75849b" placeholder="Name" value="" maxlength="256" data-float-placeholder="true"></div>
            <div class="field-required">This field is required.</div>
          </div>
        </div>
      </section>
      <section data-editor="component" class="form-group col-sm-6 js-component js-component-input">
        <div class="form-control form-required">
          <div class="f-holder f-holder--no-star"><label class="page-around-room-form__label required-label rebranding-require-star after-main-color" for="c81e728d9d4c2f636f067f89cc14862c">Last Name</label>
            <div><input class="page-around-room-form__field" type="text" name="c81e728d9d4c2f636f067f89cc14862c" id="c81e728d9d4c2f636f067f89cc14862c" placeholder="Last Name" value="" maxlength="256" data-float-placeholder="true"></div>
            <div class="field-required">This field is required.</div>
          </div>
        </div>
      </section>
      <section data-editor="component" class="form-group col-sm-6 js-component js-component-input">
        <div class="form-control form-required">
          <div class="f-holder f-holder--no-star"><label class="page-around-room-form__label required-label rebranding-require-star after-main-color" for="eccbc87e4b5ce2fe28308fd9f2a7baf3">Email Address</label>
            <div><input class="page-around-room-form__field" type="text" name="eccbc87e4b5ce2fe28308fd9f2a7baf3" id="eccbc87e4b5ce2fe28308fd9f2a7baf3" placeholder="Email Address" value="" maxlength="256" data-float-placeholder="true"></div>
            <div class="field-required">This field is required.</div>
          </div>
        </div>
      </section>
      <section data-editor="component" class="form-group col-sm-6 js-component js-component-input">
        <div class="form-control form-required">
          <div class="f-holder f-holder--no-star"><label class="page-around-room-form__label after-main-color" for="d3d9446802a44259755d38e6d163e820">Company</label>
            <div><input class="page-around-room-form__field" type="text" name="d3d9446802a44259755d38e6d163e820" id="d3d9446802a44259755d38e6d163e820" placeholder="Company" value="" maxlength="256" data-float-placeholder="true"></div>
            <div class="field-required">This field is required.</div>
          </div>
        </div>
      </section>
    </div>
    <div class="form-action btn-wrap">
      <div class="page-around-room-form__required rebranding-require-star">Required fields</div> <button class="btn rebranding-bgcolor font-roboto-medium page-around-room__btn-large btn-success  effect-zoom-out" id="registrationBtn" type="button"
        data-loading="false"><span class="btn-txt">Register now</span><span class="spinner spinner-btn"></span></button>
    </div>
    <div id="resendContainer" class="row">
      <div class="col-12">
        <div class="text-center">
          <div class="page-around-room-form__preresend">If you have already registered and can't locate your registration confirmation email,&nbsp;<a href="#" id="alreadyRegisteredBtn">click here!</a>
            <div id="resendForm" class="form-inline form-inline-center" data-url="https://cyberranges.clickmeeting.com/574931444/registration_required/resend.json" style="display: none;">
              <div class="form-group required tip tip-info pos-tc mt-0 page-around-room-form__resend-box">
                <div class="tip-wrap page-around-room-form__resend-wrap">
                  <div id="resendTooltip" class="before-send-tooltip"><label class="form-label pt-2 text-nowrap" for="email">E-mail:</label>
                    <div class="form-control">
                      <div class="f-holder" data-loading="false"><input type="text" name="email" id="email" class="shadow-none" placeholder="Type here" autocomplete="off" value=""></div>
                      <div class="resend-tip dsp-none">The email address is incorrect. Please double-check your email address.</div>
                    </div>
                    <div class="btn-wrap pr-0 pt-2 text-nowrap"> <button class="btn fR p-0 btn-link small effect-zoom-out" id="btn-resend" type="button" data-loading="false"><span class="btn-txt">Resend</span><span
                          class="spinner spinner-btn"></span></button></div>
                  </div>
                  <div id="successTooltip" class="after-send-tooltip hide"><svg class="svg-stroke ico-from_email">
                      <use xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="/images/dist/icons_sprite-abbebc0b7c.svg?r=1661231558#ico_from_email"></use>
                    </svg>
                    <p>A confirmation email with logging details has been sent to the provided email.</p>
                  </div>
                </div>
              </div>
            </div>
          </div>
          <p class="page-around-room-form__check_connection">System configuration test. <a href="https://cyberranges.clickmeeting.com/mitre-att-ck-fundamentals-3-day-webinar/connection-tester" target="_blank">Click here!</a></p>
        </div>
      </div>
    </div>
  </fieldset>
  <fieldset class="col-12">
    <div class="page-around-room__wrap">
      <section data-editor="component" class="page-around-room-agenda">
        <h3 class="page-around-room-agenda__title"><span class="rebranding-color"><svg class="svg-stroke ico-agenda page-around-room__svg mr-3">
              <use xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="/images/dist/icons_sprite-abbebc0b7c.svg?r=1661231558#ico_agenda"></use>
            </svg></span>Agenda</h3>
        <div class="event-schedule-editable page-around-room-agenda__content">
          <h3 style="text-align:center"></h3>
          <h3 style="text-align:center"><img src="https://verveindustrial.com/wp-content/uploads/2021/05/5bfdce88cd3820f7c5c21e02_mitre.png" alt="5bfdce88cd3820f7c5c21e02_mitre.png"></h3>
          <h3 style="text-align:center"><strong>MITRE ATT&amp;CK Fundamentals - 3-Day Webinar</strong></h3>
          <div><strong><br></strong></div>
          <h4 style="text-align:center"><strong>What is the MITRE ATT&amp;CK Framework?</strong></h4>
          <p>MITRE ATT&amp;CK is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&amp;CK knowledge base is used as a foundation for the development of specific threat models and
            methodologies in the private sector, in government, and in the cybersecurity product and service community.</p>
          <p><br></p>
          <h4 style="text-align:center"><strong>Why should you learn how to use the MITRE ATT&amp;CK Framework?</strong></h4>
          <p style="text-align:left">ATT&amp;CK helps you understand how attackers might operate so that you can plan and build response playbooks to mitigate attacker incidents. Armed with this knowledge and “attack playbooks” you are now better
            prepared to understand how your adversaries prepare for, launch, and execute their attacks to achieve specific desired objectives.</p>
          <p style="text-align:left">Another important use of ATT&amp;CK is to help you learn how to detect an attacker’s actions on your network. The ATT&amp;CK Framework includes resources that are purpose-built to help you develop analytics that
            detect the techniques used by attackers as they attempt to breach, explore, and exfiltrate data from your databases. ATT&amp;CK will also provide information on hacking collectives or groups and the campaigns they’ve conducted, allowing
            you to be as prepared as possible for a future attack.<br></p>
          <p>Successful and comprehensive threat detection requires understanding common adversary TTPs, that is the Tactics, Techniques, and procedures especially those that pose a threat to your organization, and how to detect and mitigate these
            attacks.</p>
          <p><br></p>
          <h4 style="text-align:center">What's Included?<br></h4>
          <div>
            <ul>
              <li>Free access to the CYBER RANGES MITRE ATT&amp;CK Fundamentals playlist for the duration of the event.</li>
              <li>Certificate of completion.</li>
              <li>Access to the official CYBER RANGES Discord server.</li>
              <li>A recorded version of the webinar sent straight to your inbox.</li>
            </ul>
          </div>
          <hr>
          <h3 style="text-align:center"><strong>Training Schedule</strong></h3>
          <div><strong><br></strong></div>
          <h4 style="text-align:center"><strong>Day 1</strong></h4>
          <ul>
            <li>Get a formal introduction to the MITRE ATT&amp;CK Framework.</li>
            <li>Understand what matrices make up the MITRE ATT&amp;CK Framework and be able to use them.</li>
            <li>Understand what tactics are and how they are used by Advanced Persistent Threat Groups (APT's).</li>
            <li>Understand what are APT (Advanced Persistent Threat) groups and how they impact the MITRE ATT&amp;CK Framework.</li>
            <li>Understand what types of Software and Malware that could be used by a defender, pen tester, red teamer, or adversary.</li>
            <li>Understand what Mitigations are and how they can be used to prevent a technique or sub-technique from being successfully executed.</li>
          </ul>
          <br>
          <h4 style="text-align:center"><strong>Day 2</strong></h4>
          <ul>
            <li style="text-align:left">Understand what the MITRE ATT&amp;CK Navigator is used for.</li>
            <li>Learn how to use the MITRE ATT&amp;CK navigator for threat hunting &amp; Cyber Threat Intelligence (CTI).</li>
            <li>Learn how to map an individual Threat Group to Navigator.</li>
            <li>Learn how to take your heatmap analysis and combine it with CTI (Cyber Threat Intelligence).</li>
          </ul>
          <div><br></div>
          <div>
            <p style="text-align:left"></p>
          </div>
          <h4 style="text-align:center"><strong>Day 3</strong></h4>
          <ul>
            <li>Learn how to use the MITRE ATT&amp;CK Framework to perform Cyber Threat Intelligence using a practical case study for an organization.</li>
            <li>Learn how to map multiple APT ( Advanced Persistent Threat ) Groups on MITRE Navigator.</li>
            <li>Learn how to analyze multiple Threat Groups and determine the priority techniques used by said groups.</li>
            <li>Learn how to use Sigma Rules within the Mitre ATT&amp;CK Framework.</li>
            <li>Map Sigma Rules to Mitre ATT&amp;CK Navigator.</li>
            <li>Using Sigma2attack.</li>
          </ul>
          <div><span><br></span></div>
          <div><span>Having trouble joining the Webinar? you can access the webinar on our YouTube channel:&nbsp;https://www.youtube.com/channel/UCnwJsmSkzBuLrxfUJKwnQyw</span></div>
        </div>
      </section>
    </div>
  </fieldset>
  <fieldset class="col-12 p-0">
    <div>
      <section data-editor="component" class=" page-around-room-presenters col-12">
        <div class="page-around-room__wrap w-100">
          <div class="page-around-room-presenters__wrap">
            <div class="event-presenter-avatar page-around-room-presenters__avatar">
              <div class="avatar-wrap">
                <div data-selector="photoContainer" class="avatar avatar-decorate large" data-loading="false"><img src="https://sc.stat-cdn.com/storage/files/66/57/1816657/presenters/1152403/96cc04b4783865f9f83e67d9d0f3bd81.png"
                    alt=""><i class="spinner spinner-avatar spinner-size-medium"></i></div>
              </div>
            </div>
            <div class="event-presenter-info event-presenter-info--tab w-100">
              <div class="event-presenter-frame w-100">
                <dl class="social">
                  <dd>
                    <p class="page-around-room-presenters__profiles">View profile on</p>
                    <ul class="list-inline">
                      <li>
                        <a class="page-around-room__social" title="Twitter" href="http://twitter.com/chuksjonia" target="_blank"><svg class="svg-fill ico-twitter_square"><use xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="/images/dist/icons_sprite-abbebc0b7c.svg?r=1661231558#ico_twitter_square"></use></svg></a>
                      </li>
                    </ul>
                  </dd>
                </dl>
                <div class="event-presenter-header"><span class="page-around-room-presenters__position">Presenter</span>
                  <h3 class="page-around-room-presenters__name">Mr Alexis Ahmed</h3>
                </div>
              </div>
              <div class="page-around-room__desc break-word">Red Team Instructor - CYBER RANGES<div class="clearfix"></div>
              </div>
            </div>
          </div>
        </div>
      </section>
    </div>
  </fieldset>
</form>

Text Content

en
 * en
 * de
 * pl
 * it
 * es
 * fr
 * ru
 * pt


MITRE ATT&CK FUNDAMENTALS - 3-DAY WEBINAR

Date

Monday, October 17, 2022

Time

06:00 PM Africa/Nairobi

Convert to my timezone
Name

This field is required.
Last Name

This field is required.
Email Address

This field is required.
Company

This field is required.
Required fields
Register now
If you have already registered and can't locate your registration confirmation
email, click here!
E-mail:
The email address is incorrect. Please double-check your email address.
Resend

A confirmation email with logging details has been sent to the provided email.

System configuration test. Click here!


AGENDA


MITRE ATT&CK FUNDAMENTALS - 3-DAY WEBINAR




WHAT IS THE MITRE ATT&CK FRAMEWORK?

MITRE ATT&CK is a globally-accessible knowledge base of adversary tactics and
techniques based on real-world observations. The ATT&CK knowledge base is used
as a foundation for the development of specific threat models and methodologies
in the private sector, in government, and in the cybersecurity product and
service community.




WHY SHOULD YOU LEARN HOW TO USE THE MITRE ATT&CK FRAMEWORK?

ATT&CK helps you understand how attackers might operate so that you can plan and
build response playbooks to mitigate attacker incidents. Armed with this
knowledge and “attack playbooks” you are now better prepared to understand how
your adversaries prepare for, launch, and execute their attacks to achieve
specific desired objectives.

Another important use of ATT&CK is to help you learn how to detect an attacker’s
actions on your network. The ATT&CK Framework includes resources that are
purpose-built to help you develop analytics that detect the techniques used by
attackers as they attempt to breach, explore, and exfiltrate data from your
databases. ATT&CK will also provide information on hacking collectives or groups
and the campaigns they’ve conducted, allowing you to be as prepared as possible
for a future attack.


Successful and comprehensive threat detection requires understanding common
adversary TTPs, that is the Tactics, Techniques, and procedures especially those
that pose a threat to your organization, and how to detect and mitigate these
attacks.




WHAT'S INCLUDED?


 * Free access to the CYBER RANGES MITRE ATT&CK Fundamentals playlist for the
   duration of the event.
 * Certificate of completion.
 * Access to the official CYBER RANGES Discord server.
 * A recorded version of the webinar sent straight to your inbox.

--------------------------------------------------------------------------------


TRAINING SCHEDULE




DAY 1

 * Get a formal introduction to the MITRE ATT&CK Framework.
 * Understand what matrices make up the MITRE ATT&CK Framework and be able to
   use them.
 * Understand what tactics are and how they are used by Advanced Persistent
   Threat Groups (APT's).
 * Understand what are APT (Advanced Persistent Threat) groups and how they
   impact the MITRE ATT&CK Framework.
 * Understand what types of Software and Malware that could be used by a
   defender, pen tester, red teamer, or adversary.
 * Understand what Mitigations are and how they can be used to prevent a
   technique or sub-technique from being successfully executed.


DAY 2

 * Understand what the MITRE ATT&CK Navigator is used for.
 * Learn how to use the MITRE ATT&CK navigator for threat hunting & Cyber Threat
   Intelligence (CTI).
 * Learn how to map an individual Threat Group to Navigator.
 * Learn how to take your heatmap analysis and combine it with CTI (Cyber Threat
   Intelligence).






DAY 3

 * Learn how to use the MITRE ATT&CK Framework to perform Cyber Threat
   Intelligence using a practical case study for an organization.
 * Learn how to map multiple APT ( Advanced Persistent Threat ) Groups on MITRE
   Navigator.
 * Learn how to analyze multiple Threat Groups and determine the priority
   techniques used by said groups.
 * Learn how to use Sigma Rules within the Mitre ATT&CK Framework.
 * Map Sigma Rules to Mitre ATT&CK Navigator.
 * Using Sigma2attack.



Having trouble joining the Webinar? you can access the webinar on our YouTube
channel: https://www.youtube.com/channel/UCnwJsmSkzBuLrxfUJKwnQyw

View profile on

 * 

Presenter


MR ALEXIS AHMED

Red Team Instructor - CYBER RANGES

See other events from this host

Browser compatibility. Your browser is not compatible with our audio-video
technology

For a flawless experience, we highly recommend using the latest version of
Chrome, Safari, Firefox, Yandex, Opera, or Edge browser .

For a flawless experience, we highly recommend using the latest version of
Chrome, Safari, Firefox, Yandex, Opera, or Edge browser .

Learn more


BROWSER COMPATIBILITY

Your browser is not compatible with our audio-video technology. Raise your event
quality to the highest standard. Upgrade your browser or switch to

the latest versions of

Google Chrome
Mozilla Firefox
Safari
Opera
Yandex

This room is using WebRTC technology, meaning that your audience will experience
the best possible audio-video during your online event. Unfortunately, not all
internet browsers are compatible with this technology at the moment. For more
information, go to the FAQ section in our Knowledge Base.

Share this page!
 * 
 * 
 * 

Powered by ClickMeeting Webinar Software.