Bummer! This is just a preview. You need to be signed in with an account to view the entire instruction.

Well done!

You have completed (UPI) Chapter 15: Cyber-Security Training and Continuous Adaptation of Programmes!

Instruction

15.2.3. The Building-Blocks of the THREAT-ARREST Cyber-Security Training Framework

The operation of the THREAT-ARREST cyber-ranges platform is driven by CTTP models. In this subsection, we briefly introduce the CTTP-modelling features and explain how a training program is established. More details can be found in . 15.2.3.1. CTTP Modelling Figure 1. The THREAT-ARREST lifecycle. The THREAT-ARREST modelling approach consists of four main stages (see Figure 1): Analysis ...