# Threat and Vulnerability Management

- [!Nessus](/defense/threat-and-vulnerability-management/untitled.md)
- [Introduction](/defense/threat-and-vulnerability-management/untitled/introduction.md)
- [Installation](/defense/threat-and-vulnerability-management/untitled/installation.md)
- [!Navigation and Scans](/defense/threat-and-vulnerability-management/untitled/navigation-and-scans.md)
- [Answers](/defense/threat-and-vulnerability-management/untitled/navigation-and-scans/answers.md)
- [!Scanning](/defense/threat-and-vulnerability-management/untitled/scanning.md)
- [!Scanning a Web Application](/defense/threat-and-vulnerability-management/untitled/scanning-a-web-application.md)
- [MITRE](/defense/threat-and-vulnerability-management/mitre.md)
- [Introduction to Mitre](/defense/threat-and-vulnerability-management/mitre/introduction-to-mitre.md)
- [Basic Terminology](/defense/threat-and-vulnerability-management/mitre/basic-terminology.md)
- [ATT\&CK Framework](/defense/threat-and-vulnerability-management/mitre/att-and-ck-framework.md)
- [Answers](/defense/threat-and-vulnerability-management/mitre/att-and-ck-framework/answers.md)
- [CAR Knowledge Base](/defense/threat-and-vulnerability-management/mitre/car-knowledge-base.md)
- [Answers](/defense/threat-and-vulnerability-management/mitre/car-knowledge-base/answers.md)
- [Shield Active Defense](/defense/threat-and-vulnerability-management/mitre/shield-active-defense.md)
- [Answers](/defense/threat-and-vulnerability-management/mitre/shield-active-defense/answers.md)
- [ATT\&CK EmulationPlans](/defense/threat-and-vulnerability-management/mitre/untitled.md)
- [Answers](/defense/threat-and-vulnerability-management/mitre/untitled/answers.md)
- [ATT\&CK® and Threat Intelligence](/defense/threat-and-vulnerability-management/mitre/att-and-ck-r-and-threat-intelligence.md)
- [Answers](/defense/threat-and-vulnerability-management/mitre/att-and-ck-r-and-threat-intelligence/answers.md)
- [Conclusion](/defense/threat-and-vulnerability-management/mitre/conclusion.md)
- [Yara](/defense/threat-and-vulnerability-management/yara.md)
- [Introduction](/defense/threat-and-vulnerability-management/yara/introduction.md)
- [What is Yara?](/defense/threat-and-vulnerability-management/yara/what-is-yara.md)
- [Answers](/defense/threat-and-vulnerability-management/yara/what-is-yara/answers.md)
- [Installing Yara (Ubuntu/Debian & Windows)](/defense/threat-and-vulnerability-management/yara/installing-yara-ubuntu-debian-and-windows.md)
- [Deploy](/defense/threat-and-vulnerability-management/yara/deploy.md)
- [Introduction to Yara Rules](/defense/threat-and-vulnerability-management/yara/introduction-to-yara-rules.md)
- [Expanding on Yara Rules](/defense/threat-and-vulnerability-management/yara/expanding-on-yara-rules.md)
- [Yara Modules](/defense/threat-and-vulnerability-management/yara/yara-modules.md)
- [Other Tools and Yara](/defense/threat-and-vulnerability-management/yara/other-tools-and-yara.md)
- [Using LOKI and its Yara rule set](/defense/threat-and-vulnerability-management/yara/using-loki-and-its-yara-rule-set.md)
- [Answers](/defense/threat-and-vulnerability-management/yara/using-loki-and-its-yara-rule-set/answers.md)
- [Untitled](/defense/threat-and-vulnerability-management/yara/using-loki-and-its-yara-rule-set/untitled.md)
- [Creating Yara rules with yarGen](/defense/threat-and-vulnerability-management/yara/creating-yara-rules-with-yargen.md)
- [Answers](/defense/threat-and-vulnerability-management/yara/creating-yara-rules-with-yargen/answers.md)
- [Untitled](/defense/threat-and-vulnerability-management/yara/creating-yara-rules-with-yargen/untitled.md)
- [Valhalla](/defense/threat-and-vulnerability-management/yara/valhalla.md)
- [Answers](/defense/threat-and-vulnerability-management/yara/valhalla/answers.md)
- [Conclusion](/defense/threat-and-vulnerability-management/yara/conclusion.md)
- [Intro to ISAC](/defense/threat-and-vulnerability-management/intro-to-isac.md)
- [Introduction](/defense/threat-and-vulnerability-management/intro-to-isac/introduction.md)
- [Basic Terminology](/defense/threat-and-vulnerability-management/intro-to-isac/basic-terminology.md)
- [What is Threat Intelligence?](/defense/threat-and-vulnerability-management/intro-to-isac/what-is-threat-intelligence.md)
- [What are ISACs?](/defense/threat-and-vulnerability-management/intro-to-isac/what-are-isacs.md)
- [Using Threat Connect to create a Threat Intel dashboard](/defense/threat-and-vulnerability-management/intro-to-isac/using-threat-connect-to-create-a-threat-intel-dashboard.md)
- [Introduction to AlienVault OTX](/defense/threat-and-vulnerability-management/intro-to-isac/introduction-to-alienvault-otx.md)
- [Using OTX to gather Threat Intelligence](/defense/threat-and-vulnerability-management/intro-to-isac/using-otx-to-gather-threat-intelligence.md)
- [Creating IOCs](/defense/threat-and-vulnerability-management/intro-to-isac/creating-iocs.md)
- [Investigating IOCs](/defense/threat-and-vulnerability-management/intro-to-isac/investigating-iocs.md)
- [Answers](/defense/threat-and-vulnerability-management/intro-to-isac/investigating-iocs/untitled.md)
- [Zero Logon](/defense/threat-and-vulnerability-management/zero-logon.md)
- [The Zero Day Angle](/defense/threat-and-vulnerability-management/zero-logon/the-zero-day-angle.md)
- [Impacket Installation](/defense/threat-and-vulnerability-management/zero-logon/impacket-installation.md)
- [The Proof of Concept](/defense/threat-and-vulnerability-management/zero-logon/the-proof-of-concept.md)
- [Answers](/defense/threat-and-vulnerability-management/zero-logon/the-proof-of-concept/answers.md)
- [Lab it up!](/defense/threat-and-vulnerability-management/zero-logon/lab-it-up.md)
- [Answers](/defense/threat-and-vulnerability-management/zero-logon/lab-it-up/answers.md)
- [Untitled](/defense/threat-and-vulnerability-management/zero-logon/lab-it-up/untitled.md)
- [!OpenVAS](/defense/threat-and-vulnerability-management/openvas.md)
- [!MISP](/defense/threat-and-vulnerability-management/misp.md)
