Course Summary

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
1 hour
Difficulty
Beginner
CEU/CPE
2
Video Transcription
00:00
>> With that, we've reached the end of the course.
00:00
In summary, in Module 1,
00:00
we explored the motivation and philosophy of ATT&CK,
00:00
as well as the structure and
00:00
what information is included within the knowledge base.
00:00
In Module 2, we explored
00:00
the various benefits of using ATT&CK,
00:00
such as the common language and
00:00
the ability to create metrics and a common scorecard.
00:00
Finally, in Module 3,
00:00
we explored how to operationalize
00:00
the knowledge captured with
00:00
an ATT&CK in various cybersecurity practices such as CTI,
00:00
building detections, emulating threats,
00:00
and assessing and improving their environment into
00:00
this cumulative process that
00:00
we call threatened form defense.
00:00
Once again, I just want to thank you for joining me.
00:00
I really hope you enjoyed our time together.