Threat and Vulnerability Management

Identify how attackers are developing their techniques to use in your defensive strategy.
As defenders, the objective is to stop an adversary from achieving their goal. These adversaries are using both their own trade craft and other methods to launch attacks against organisations. This module will explore the various tools and methodologies that will help defenders keep up with the latest threat intelligence to understand how adversaries are operating and apply it to your defense strategy.

0%
Nessus
Learn how to set up and use Nessus, a popular vulnerability scanner.
0%
MITRE
This room will discuss the various resources MITRE has made available for the cybersecurity community.
0%
Yara
Learn the applications and language that is Yara for everything threat intelligence, forensics, and threat hunting!
0%
Zero Logon
Learn about and exploit the ZeroLogon vulnerability that allows an attacker to go from Zero to Domain Admin without any valid credentials.
0%
OpenVAS
Learn the basics of threat and vulnerability management using Open Vulnerability Assessment Scanning
0%
MISP
Walkthrough on the use of MISP as a Threat Sharing Platform
What are modules?
A learning pathway is made up of modules, and a module is made of bite-sized rooms (think of a room like a mini security lab).
