What do you need?
All you need is a web browser on a workstation/laptop (no iPads, sorry).
Please register using a valid email address so we can provision your VMware lab environment before the workshop
Emulate procured Tactics, Techniques, and Procedures (TTPs) commonly found in modern attacks
Generate data to use in detection engineering
Leverage MITRE ATT&CK, pivoting from the emulations to potential log sources
Learn how to troubleshoot log sources to resolve logging issues