WEBVTT

00:00.000 --> 00:03.000
>> With that, we've reached
the end of the course.

00:03.000 --> 00:05.805
In summary, in Module 1,

00:05.805 --> 00:08.940
we explored the motivation
and philosophy of ATT&CK,

00:08.940 --> 00:10.380
as well as the structure and

00:10.380 --> 00:13.050
what information is included
within the knowledge base.

00:13.050 --> 00:15.330
In Module 2, we explored

00:15.330 --> 00:17.190
the various benefits
of using ATT&CK,

00:17.190 --> 00:18.690
such as the common language and

00:18.690 --> 00:21.670
the ability to create metrics
and a common scorecard.

00:21.670 --> 00:24.010
Finally, in Module 3,

00:24.010 --> 00:25.810
we explored how
to operationalize

00:25.810 --> 00:27.020
the knowledge captured with

00:27.020 --> 00:30.980
an ATT&CK in various cybersecurity
practices such as CTI,

00:30.980 --> 00:33.245
building detections,
emulating threats,

00:33.245 --> 00:35.540
and assessing and improving
their environment into

00:35.540 --> 00:36.740
this cumulative process that

00:36.740 --> 00:39.080
we call threatened form defense.

00:41.270 --> 00:44.660
Once again, I just want to
thank you for joining me.

00:44.660 --> 00:47.670
I really hope you enjoyed
our time together.

