welcome to the fourth and final lesson of module to
In this lesson, we will explore the structure and purpose of the Attack Navigator
and appreciate how this tool can allow us to create custom attack visualizations.
Until now, you might have been wondering how I've made all these awesome attack visualizations
and this lesson I'm going to share my secret.
The Attack Navigator is a tool designed to provide basic navigation and annotation of attack matrices.
The attack navigator allows us to manipulate the cells in the matrix,
adding color comments assigning numerical values are capturing into the metrics or notes.
This function is really important, especially when we think about these quantitative score cards from the previous lesson,
as the attack Navigator allows to visualize various metrics such as defensive coverage, output of red and blue teams, frequency of detective techniques
or any other metrics that we want to capture and present.
Each custom view created by the Navigator is called a layer,
and these layers can be created interactively within the tool or generated using the custom Jason format for the navigator.
These layers can also be exported and shared between analysts.
Full source code and documentation for the Navigator are available at our attack Navigator. Get Hub repository.
These instructions include how to stand up and run your own instance of Navigator,
but we also host one online for everyone to use.
I definitely recommend getting your own hands on experience with the Navigator.
Here's a quick introduction to how to control and use the Navigator tool.
As you can see, The Matrix have presented the bottom
where you can select each individual cell or technique.
There's also a control panel. The top 1000 to perform various other actions,
such as selecting techniques based on their mapping, is two groups software or mitigations.
We can also use these controls to add color or various other annotations to selected cells.
And once done, we can export these layers into Jason Excel or image formats.
Attack Navigator allows us to create new layers
as well as build on our open existing layers.
We can also create layers based on the various matrices with an attack such as Enterprise Mobile or even I C s.
And with that, we need to acknowledge check for less than four.
Which of the following is not true about the attack Navigator,
please positive video and take a second to think about the correct answer before proceeding.
In this case, the correct answer was a
attack. Navigator allows us to create custom visualizations but not edit attack content.
And with that, we reached the end of lesson for
in summary, the attack navigator enables us to annotate, save and share customized views of attack known as layers.
And these layers can capture many types of data map to the techniques with an attack.
And with that, we reached the end of model to
in this module we explore the various benefits of using attack,
including the diversity of information and perspective. Capture within the framework.
The common language for describing adversary behavior is provided by attack
and how attack can allow us to create
and produce cybersecurity, metrics and scorecards very often with the attack navigator.
MITRE ATT&CK Defender™ (MAD) ATT&CK® SOC Assessments Certification Training
Do you know how to leverage the MITRE ATT&CK® framework to conduct Security Operations Center ...
2 CEU/CPE Hours Available
Certificate of Completion Offered
MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training
Analysts and researchers gain hands-on instruction directly from MITRE’s experts in this MITRE ATT&CK Defender™ ...
3 CEU/CPE Hours Available
Certificate of Completion Offered