|
| 1 | +Training |
| 2 | +======== |
| 3 | + |
| 4 | +Attack Flow online training provides everything you need to get up to speed. |
| 5 | +The training includes 5 sections that start with an overview of Attack Flow, |
| 6 | +work through hands-on examples of building flows, and dives into the |
| 7 | +visualization tools. |
| 8 | + |
| 9 | +Video |
| 10 | +----- |
| 11 | + |
| 12 | +.. raw:: html |
| 13 | + |
| 14 | + <p> |
| 15 | + <iframe |
| 16 | + width="560" |
| 17 | + height="315" |
| 18 | + src="https://www.youtube.com/embed/videoseries?list=PLALq3Th79NnpW1MWghLM8ea2gc7-0MTn_" |
| 19 | + frameborder="0" |
| 20 | + allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" |
| 21 | + allowfullscreen=""></iframe> |
| 22 | + </p> |
| 23 | + |
| 24 | +Resources |
| 25 | +--------- |
| 26 | + |
| 27 | +**Play the video training above.** The 5 sections will automatically play in |
| 28 | +consecutive order, or you can click the playlist icon in the the top right of |
| 29 | +the video to jump ahead to another section. |
| 30 | + |
| 31 | +**Download the training slides and sample files** so that you can follow along |
| 32 | +with the training yourself and participate in the hands-on exercises: `Attack |
| 33 | +Flow Training.zip |
| 34 | +<https://ctidvideo.blob.core.windows.net/train/Attack%20Flow%20Training.zip>`__ |
| 35 | + |
| 36 | +Agenda |
| 37 | +------ |
| 38 | + |
| 39 | +**Section 1 -- Introduction to Attack Flow** |
| 40 | + |
| 41 | +Provides an overview for Attack Flow: why we created it, who's it for, and what |
| 42 | +you can do with it. |
| 43 | + |
| 44 | +**Section 2 -- Using Attack Flow Builder** |
| 45 | + |
| 46 | +Introduces Attack Flow Builder, which is the tool for creating and editing |
| 47 | +flows. This section also starts walking through the basic building blocks of |
| 48 | +flows. |
| 49 | + |
| 50 | +**Section 3 -- Building an Attack Flow** |
| 51 | + |
| 52 | +Walks through a real-world example of building a flow around publicly available |
| 53 | +cyber threat intelligence. We cover the strategy for building flows and then |
| 54 | +walk through a detailed example together. Use the sample files linked above to |
| 55 | +follow along on your own. |
| 56 | + |
| 57 | +**Section 4 -- Visualization** |
| 58 | + |
| 59 | +What you can do with your flows after you have built them? This section |
| 60 | +describes the suite of visualization tools that automate tedious work and/or |
| 61 | +generate insights into threats and cyberdefense. |
| 62 | + |
| 63 | +**Section 5 -- What's New in v3** |
| 64 | + |
| 65 | +For users who have experience with Attack Flow v2, you will find this short |
| 66 | +video help for learning about all the great improvements and new features in v3. |
| 67 | + |
| 68 | +Live Training |
| 69 | +------------- |
| 70 | + |
| 71 | +If you are interested in live (virtual or in-person) training: we offer live |
| 72 | +training to all `CTID Participants <https://ctid.mitre.org/participants/>`__ |
| 73 | +throughout the year. If you would like to attend one of these training, reach |
| 74 | +out to your organization's CTID point of contact. |
| 75 | + |
| 76 | +We are also available for conducting live training at conference venues. `Contact |
| 77 | +us <mailto:ctid@mitre.org?Subject=Attack%20Flow%20Training>`__ to request training. |
0 commit comments