Trending
Scenario
Most prevalent Business Email Compromise scams
Scenario
Software supply chain manipulation gaining unauthorised access to client environments
Scenario
Exploiting Unpatched or Zero-day Vulnerability in VPN or Firewall Solution
Scenario
Threats to Machine Learning’s Underlying Models
Scenario
Phishing attacks using Adversary-in-the-middle, Mark of the web bypass, and Telephone-Oriented Attack Delivery methods
Scenario
Distributed Denial of Service DDOS attacks using UDP Flood, SYN Flood, and HTTP GET
Establishing your threat landscape
System
5 modules
How to create a successful threat landscape deliverable
System
4 modules
How to build your threat management process
System
3 modules
How to create scenario-based Incident Response playbooks
System
3 modules
How to perform cybersecurity tabletop exercises for leadership teams
Recently added
Scenario
Emerging Security Threats related to GitHub
Scenario
IoT Enabled Attacks: From Initial Access to Industrial Control System Compromise
Scenario
Exfiltration: Emerging Methods of Data Theft
Scenario
Kubernetes Attacks via Vulnerability Exploitation, AWS Infiltration, and Container Break Out
Scenario
Threats to Machine Learning’s Underlying Models
Scenario
Financially-motivated Deepfake Attacks exploiting Biometric Verification, Company Share Price, and Virtual Job Interviews
Scenario
Attacks Targeting Low Earth Orbit and Geostationary Orbit Satellite Systems
Malware
Scenario
Financially-motivated Ransomware and Ransomware-as-a-Service Attacks
Scenario
Wiper malware targeting critical network components
Scenario
Cryptomining Malware Targeting AWS Cloud Infrastructure
Scenario
Information Stealer Attack that uses Malicious Advertising and Search Engine Optimisation Poisoning
Scenario
Using botnets
Organising your cyber threat intelligence capability
System
2 modules
How to assess the maturity of your cyber threat intelligence capability
System
4 modules
How to build your threat management process
System
3 modules
How to create your cyber threat intelligence process
System
7 modules 5 scenarios
How to develop your threat informed defense program charter
System
2 modules 5 scenarios
How to implement scenario-based threat management
System
3 modules
How to create scenario-based Incident Response playbooks
System
2 modules
How to effectively use analytical assessments in threat intelligence deliverables
Social Engineering
Scenario
Most prevalent Business Email Compromise scams
Scenario
Phishing attacks using Adversary-in-the-middle, Mark of the web bypass, and Telephone-Oriented Attack Delivery methods
Scenario
SIM Swapping Attack via Social Engineering the Mobile Network Provider
Scenario
Financially-motivated Deepfake Attacks exploiting Biometric Verification, Company Share Price, and Virtual Job Interviews
Scenario
Watering Hole Attack via Compromised Windows Web Servers
Fraud
Scenario
Pig Butchering and Insider Threat
Scenario
SIM Swapping Attack via Social Engineering the Mobile Network Provider
Scenario
Payment Card Fraud Committed via Web Skimming, Account Takeovers, and Physical Skimming Attacks
Scenario
Tax Fraud: Exploiting Exfiltrated Personally Identifiable Information for Fraudulent Tax Transactions
Scenario
Exfiltration: Emerging Methods of Data Theft
Fresh releases
System
1 module
How to create a Threat-Informed Defense Dashboard?
System
2 modules
How to create your threat led testing system
System
3 modules
How to be a (cyber threat) intelligence consumer
System
2 modules 5 scenarios
How to implement scenario-based threat management
System
2 modules 5 scenarios