Learn
Review the vocabulary behind CVSS, KEV, EPSS, PoC, exposure, and source confidence.
Training Hub
Use Training to sort evidence, challenge common CVE assumptions, choose action lanes, plan windows, match controls, write handoffs, walk scenarios, and then reinforce the judgment with short defensive drills. Scores stay local in this browser session.
Training Path
Follow the path left to right when onboarding, or jump straight to the activity that matches the skill you want to practice.
Review the vocabulary behind CVSS, KEV, EPSS, PoC, exposure, and source confidence.
Classify clues into exploitation, exposure, remediation, trust, and business signals before deciding action.
Challenge shortcuts like Critical equals urgent, KEV means exposed, or public PoC proves compromise.
Choose patch, mitigate, monitor, escalate, or investigate from realistic vulnerability scenarios.
Choose what fits into limited maintenance time while keeping exploitation, exposure, rollback, and owner constraints visible.
Practice choosing compensating controls when patching is blocked, delayed, unsafe, or unavailable.
Practice turning a decision into a patch-owner, SOC, leadership, risk, or change message someone can execute.
Apply the portal path to practical defender situations like no-patch mitigation and SOC handoff.
Move from practice into evidence-backed live triage when a real record needs action.
Best For
Learn the difference between evidence types before assigning urgency.
Practice when to patch, mitigate, monitor, escalate, or investigate.
Separate PoC, IOC, telemetry, and detection-readiness evidence.
Use myth checks to understand why score alone is not a decision.
Interactive Drills
Each drill gives immediate feedback and points to the next Vuln Signal page or tool to keep learning.
Mode
Difficulty
Mixed Run
Question
No active drill yet.
Open Patch Priority, IOC Spotting, or CVSS Metrics to start a short practice round.
Review