Course Summary

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
1 hour
Difficulty
Beginner
CEU/CPE
2
Video Transcription
00:00
And with that, we've reached the end of the course
00:03
in summary.
00:04
In module one, we explored the motivation and philosophy of attack
00:08
as well as the structure and what information is included within the knowledge base
00:13
in Module two. We support the various benefits of using attack such as the common language and the ability to create metrics and a common scorecard.
00:22
And finally, in Module three, we explored how to operationalize the knowledge capture with an attack
00:27
and various cyber security practices such as CT building detections, emulating threats
00:33
and assessing and improving environment into this cumulative process that we call threatened form defense.
00:42
And once again,
00:43
I just want to thank you for joining me, and I really hope you enjoyed our time together.