This is the multi-page printable view of this section.
Click here to print.
Return to the regular view of this page.
Tutorials
This site is a collection of use cases for Attack Flow and Flow Manager.
The Flow Manager tutorials section is still under construction. New use cases will be added over time.
Attack Flow and Flow Manager are useful for a wide range of security use cases.
- Attack Simulation - Learn how Attack Flow and Flow Builder can facilitate simulating attacks to test controls. (Under Construction)
- Data Sharing - Learn how to use Attack Flow and Flow Manager to share path-based security data. (Under Construction)
- detection - Learn how Attack Flow and Flow Builder can improve detection signatures. (Under Construction)
- Digital Forensics and Incident Response - Attack Flow and Flow Manager can help organizations document their DFIR in a way that facilitates finding additional useful information and gaining long-term insights. (Under Construction)
- Executive Communication - Attack Flow and Flow Manager can help improve executive communication in a way thats tracable to tactical detail. (Under Construction)
- Red Teaming - Learn how to use Attack Flow and Flow Builder to define scope before tests and document the results after. (Under Construction)
- Risk Assessment - Attack Flow and Flow Manager provide new risk assessment tools that are simply unavailable without graphs. (Under Construction)
- Threat Intelligence - Learn how Attack Flow and Flow Manager can help structure threat intelligence beyond simple Indicators of Compromise (IOCs). (Under Construction)
1 - Attack Simulation
How to use Attack Flow and Flow Manager for attack simulation.
The attack simulation tutorial is currently under construction.
2 - Data Sharing
How to use Flow Manager and Attack Flow for cyber security data sharing.
The data sharing tutorial is currently under construction.
3 - Detection
How to use Flow Manager and Attack Flow for detecting attacks.
The threat detection tutorial is currently under construction.
4 - DFIR
How to use Attack Flow and Flow Manager for Digital Forensics and Incident Response.
The DFIR tutorial is currently under construction.
5 - Executive Communication
How to use Flow Manager and Attack Flow to communicate with senior leadership.
The executive communication tutorial is currently under construction.
6 - Red Teaming
How to use Attack Flow and Flow Manager to plan and document Red Teams and Penetration Tests.
The read teaming tutorial is currently under construction.
7 - Risk Assessment
How to use Attack Flow and Flow Manager to analyze your security risks holistically.
The risk assessment tutorial is currently under construction.
8 - Security Engineering
How to use Attack Flow and Flow Manager to analyze your attack surface and plan your mitigations.
The security engineering tutorial is currently under construction.
9 - Threat Intelligence
How to use Attack Flow and Flow Manager to store and utilize your threat intelligence..
The threat intelligence tutorial is currently under construction.