Emulate procured Tactics, Techniques, and Procedures (TTPs) commonly found in modern attacks
Generate data to use in detection engineering
Leverage MITRE ATT&CK, pivoting from the emulations to potential log sources
Learn how to troubleshoot log sources to resolve logging issues
What do you need?
All you need is a web browser on a workstation/laptop (no iPads, sorry).
Please register using a valid email address so we can provision your VMware lab environment before the workshop