hack3rs.ca network-security
/learning/frameworks :: frameworks-and-feeds

student@hack3rs:~/learning/frameworks$ ls -R

Frameworks and Feeds (Defender Program Track)

This track teaches how to think like an operator when choosing what to patch first, which controls matter most, how to organize a security program, how to map detections to attacker behavior, and how to learn tools correctly from documentation.

These topics are integrated into the learning program because tools alone are not enough. Strong defenders need decision frameworks, prioritization discipline, and a repeatable way to translate evidence into action.

where-this-fits-in-your-program

  • $Use after foundational networking and logging modules so the frameworks connect to real evidence.
  • $Use alongside tools training to avoid “tool-first, strategy-later” mistakes.
  • $Use before building advanced detections, dashboards, and response KPIs.
  • $Revisit after incidents to improve governance, prioritization, and coverage decisions.

what-you-will-learn

  • $How to prioritize remediation using exploit evidence (KEV-style).
  • $How to define realistic baseline controls for small/medium teams.
  • $How to use NIST CSF as a working model for operations, not just governance slides.
  • $How to use ATT&CK to map detections, telemetry dependencies, and coverage gaps.
  • $How to use vendor/community docs to build durable skills and safe workflows.

frameworks-and-feeds.curriculum

Follow the modules in order. They are sequenced to move from operational prioritization and baseline controls into governance structure, threat-informed mapping, and long-term self-learning discipline.

KEV prioritization is how defenders stop treating a 2,500-finding scanner backlog as a flat list and start acting on what attackers are actually exploiting. This module teaches a defender workflow for ranking remediation work by exposure, real-world exploit activity, and asset criticality.

Security vendor documentation is how practitioners actually build reliable tool knowledge — not by memorizing commands from blog posts. This module teaches a repeatable method for turning official and community docs into validated workflows you can operate under pressure.