Companies Home Search Profile

DeTT&CT: Mapping Blue Team to ATT&CK

Focused View

Vipul Dabhi

1:02:23

56 View
  • 1. Introduction.mp4
    11:57
  • 2. DeTT&CT Introduction.mp4
    15:09
  • 3. DeTT&CT Introduction 2.mp4
    06:44
  • 4. DeTT&CT Installation & Setup.mp4
    11:12
  • 5. DeTT&CT Walkthrough & Attack Navigator.mp4
    17:21
  • Description


    DeTT&CT Framework

    What You'll Learn?


    • Understanding How to use DeTT&CT framework Theory & Hands on Implementation
    • Understand how to Map Your Blue Team To MITRE ATT&CK
    • MITRE ATT&CK Framework
    • Why we need DeTT&CT framework

    Who is this for?


  • Cyber Security Professionals, Incident Responders, Threat Hunter, Cloud Security Professional
  • More details


    Description

    Building detection is a complex task, especially with a constantly increasing amount of data sources. Keeping track of these data sources and their appropriate detection rules or avoiding duplicate detection rules covering the same techniques can give a hard time to detection engineers.

    For a SOC, it is crucial to have an good overview and a clear understanding of its actual visibility and detection coverage in order to identify gaps, prioritize the development of new detection rules or onboard new data sources.

    DeTT&CT stands for Detect Tactics, Techniques & Combat Threats. This framework has been created at the Cyber Defence Center of Rabobank and is developed and at the time of writing maintained by Marcus Bakker and Ruben Bouman.

    The purpose of DeTT&CT is to assist blue teams using MITRE ATT&CK to score and compare data log source quality, visibility coverage and detection coverage. By using this framework, blue teams can quickly detect gaps in the detection or visibility coverage and prioritize the ingest of new log sources.

    DeTT&CT delivers a framework than can map the information you have on the entities available in ATT&CK and help you manage your blue teams data, visibility, and detection coverage.

    Data Sources:

    Data sources are the raw logs or events generated by systems, e.g., security appliances, network devices, and endpoints. ATT&CK has over 30 different data sources which are further divided into over 90 data components. All those data components are included in this framework. These data sources are administered within the data source administration YAML file. For each data source, among others, the data quality can be scored. Within ATT&CK, these data sources are listed within the techniques themselves (e.g. T1003 in the Detection section).


    Who this course is for:

    • Cyber Security Professionals, Incident Responders, Threat Hunter, Cloud Security Professional

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    This is Vipul Dabhi your course Instructor, I am Cyber Security & Cloud Security Practitoner from various cloud provider like Oracle Cloud Infrastructure, Amazon Web Service, Azure Cloud, Alibaba Cloud.I have certification in :Azure Cloud(AZ 900 Azure Fundamentals, AZ 500 Azure Security Specialization), Alibaba Cloud (Alibaba Fundamentals & Alibaba Cloud Security Associate) & Oracle Cloud Infrastructure.(OCI Associate).With this Udemy Channel my motive is to bring information on various Cloud Security, Emerging Cloud Security tools like Sentinel, Defender ATP,MCAS, Cyber threat, Attacks,Payload they carry to breach your native system.Will include Case Studies and other emerging cyber security labs and Course through this very native Udemy Channel.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 5
    • duration 1:02:23
    • Release Date 2023/02/13