chg: [home] more descriptions on the homepage

pull/56/head
Christophe Vandeplas 2022-01-30 08:27:04 +01:00
parent 9c97bb5ac5
commit 75adc3e7a5
7 changed files with 20 additions and 14 deletions

View File

@ -1,4 +1,4 @@
text: ""
text: "The MISP is an open source software solution for collecting, storing, distributing and sharing cyber security indicators and threats about cyber security incidents analysis and malware analysis. MISP is designed by and for incident analysts, security and ICT professionals or malware reversers to support their day-to-day operations to share structured information efficiently."
name: "MISP Portal"
position: ""
avatar: "img/testimonials/misp.png"

View File

@ -1,4 +1,4 @@
text: "Many MISP galaxy clusters are already available like MITRE ATT&CK, Exploit-Kit, Microsoft Activity Group actor, Preventive Measure, Ransomware, TDS, Threat actor or Tool used by adversaries. \n\nTaxonomies provide a set of already defined classifications modeling estimative language, CSIRTs/CERTs classifications, national classifications or threat model classification."
text: "Many MISP [galaxy clusters](datamodels/#misp-galaxy) are already available like MITRE ATT&CK, Exploit-Kit, Microsoft Activity Group actor, Preventive Measure, Ransomware, TDS, Threat actor or Tool used by adversaries. \n\n[Taxonomies](datamodels/#misp-taxonomies) provide a set of already defined classifications modeling estimative language, CSIRTs/CERTs classifications, national classifications or threat model classification."
name: "MISP Galaxies & Taxonomies"
position: ""
avatar: "img/testimonials/galaxy.png"

View File

@ -1,4 +1,5 @@
text: "TODO balblabla training, education, learning, best practices, ... Free & paid courses available"
name: "MISP Docu & Trainings"
position: ""
avatar: "img/testimonials/book.png"
text: "In a continuous effort since 2016, [CIRCL](https://www.circl.lu) frequently gives practical training sessions about MISP. The purpose is to reach out to security analysts using MISP as a threat intelligence platform along with users using it as an information sharing platform.\n\n
All the [training materials]([https://github.com/MISP/misp-training) are open source, include slides and a virtual machine preconfigured with the latest version of MISP. [Reach out](professional-services) if you are looking for custom training."

View File

@ -1,4 +1,5 @@
text: ""
text: "[PyMISP](https://github.com/MISP/PyMISP) is a Python library to access MISP platforms via their REST API. \n\n
PyMISP allows you to fetch events, add or update events/attributes, add or update samples or search for attributes programmatically. [Discover more](https://github.com/MISP/PyMISP)"
name: "PyMISP"
position: ""
avatar: "img/testimonials/pymisp.png"

View File

@ -1,4 +1,8 @@
text: "TODO"
text: "MISP modules are autonomous modules that can be used to extend MISP for new services such as expansion, import and export.
\n\n
The modules are written in Python 3 following a simple API interface. The objective is to ease the extensions of MISP functionalities without modifying core components.
\n\n
For more information: [Extending MISP with Python modules](https://www.misp-project.org/misp-training/3.1-misp-modules.pdf) slides from MISP [training](https://github.com/MISP/misp-training)."
name: "MISP Modules"
position: ""
avatar: "img/testimonials/modules.png"

View File

@ -1,4 +1,4 @@
text: "TODO https://github.com/MISP/misp-stix"
name: "STIX & TAXII"
position: ""
avatar: "img/testimonials/stix.png"
# text: "TODO https://github.com/MISP/misp-stix"
# name: "STIX & TAXII"
# position: ""
# avatar: "img/testimonials/stix.png"

View File

@ -1,4 +1,4 @@
text: "TODO"
name: "MITRE ATT&CK"
position: ""
avatar: "img/testimonials/mitre_attack.png"
# text: "TODO"
# name: "MITRE ATT&CK"
# position: ""
# avatar: "img/testimonials/mitre_attack.png"