Back to all modules

Threat Emulation

The best way to understand how attackers work is to get hands on experience with their techniques.

Emulation is the act of imitating or mimicking a person. Defenders can imitate, or emulate, an adversarial threat against the security stack in place. With this process, defenders can measure the security stack's effectiveness and close any gaps in coverage.

Loading...

Loading rooms...

Need to know
Next Steps

What are modules?

A learning pathway is made up of modules, and a module is made of bite-sized rooms (think of a room like a mini security lab).

Learning Structure Diagram