Bummer! This is just a preview. You need to be signed in with an account to view the entire instruction.
Well done!
You have completed (UPI) Chapter 15: Cyber-Security Training and Continuous Adaptation of Programmes!
You have completed (UPI) Chapter 15: Cyber-Security Training and Continuous Adaptation of Programmes!
Instruction
15.2.3. The Building-Blocks of the THREAT-ARREST Cyber-Security Training Framework
The operation of the THREAT-ARREST cyber-ranges platform is driven by CTTP models. In this subsection, we briefly introduce the CTTP-modelling features and explain how a training program is established. More details can be found in .
15.2.3.1. CTTP Modelling
Figure 1. The THREAT-ARREST lifecycle.
The THREAT-ARREST modelling approach consists of four main stages (see Figure 1):
Analysis ...