MITRE ATT&CK Training Course
MITRE ATT&CK is a framework of tactics and techniques used to classify attacks and assesses an organization's risk. ATT&CK brings awareness to an organization's security, identifying holes in defenses and prioritizing risks.
This instructor-led, live training (online or onsite) is aimed at information system analysts who wish to use MITRE ATT&CK to decrease the risk of a security compromise.
By the end of this training, participants will be able to:
- Set up the necessary development environment to start implementing MITRE ATT&CK.
- Classify how attackers interact with systems.
- Document adversary behaviors within systems.
- Track attacks, decipher patterns, and rate defense tools already in place.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
Course Outline
Introduction
What is Malware?
- Types of malware
- The evolution of malware
Overview of Malware Attacks
- Propagating
- Non-propagating
Matrices of ATT&CK
- Enterprise ATT&CK
- Pre-ATT&CK
- Mobile ATT&CK
MITRE ATT&CK
- 11 tactics
- Techniques
- Procedures
Preparing the Development Environment
- Setting up a version control center (GitHub)
- Downloading a project that hosts a to-do list system of data
- Installing and configuring ATT&CK Navigator
Monitoring a compromised system (WMI)
- Instating command line scripts to conduct a lateral attack
- Utilizing ATT&CK Navigator to identify the compromise
- Assesing the compromise through the ATT&CK framework
- Performing process monitoring
- Documenting and patching the holes in the defense architecture
Monitoring a compromised system (EternalBlue)
- Instating command line scripts to conduct a lateral attack
- Utilizing ATT&CK Navigator to identify the compromise
- Assesing the compromise through the ATT&CK framework
- Performing process monitoring
- Documenting and patching the holes in the defense architecture
Summary and Conclusion
Requirements
- An understanding of information system security
Audience
- Information systems analysts
Open Training Courses require 5+ participants.
MITRE ATT&CK Training Course - Booking
MITRE ATT&CK Training Course - Enquiry
MITRE ATT&CK - Consultancy Enquiry
Testimonials (2)
- Understanding that ATT&CK creates a map that makes it easy to see, where an organization is protected and where the vulnerable areas are. Then to identify the security gaps that are most significant from a risk perspective. - Learn that each technique comes with a list of mitigations and detections that incident response teams can employ to detect and defend. - Learn about the various sources and communities for deriving Defensive Recommendations.
CHU YAN LEE - PacificLight Power Pte Ltd
Course - MITRE ATT&CK
All is excellent
Manar Abu Talib - Dubai Electronic Security Center
Course - MITRE ATT&CK
Upcoming Courses
Related Courses
AI-Powered Cybersecurity: Threat Detection & Response
21 HoursThis instructor-led, live training in Brazil (online or onsite) is designed for beginner-level cybersecurity professionals seeking to leverage AI to enhance their threat detection and response capabilities.
Upon completion of this training, participants will be able to:
- Comprehend the role of AI in cybersecurity.
- Deploy AI algorithms for identifying threats.
- Automate incident response processes using AI tools.
- Incorporate AI into existing cybersecurity frameworks.
AI-Powered Cybersecurity: Advanced Threat Detection & Response
28 HoursThis instructor-led live training in Brazil (online or onsite) is designed for intermediate to advanced cybersecurity professionals aiming to enhance their skills in AI-driven threat detection and incident response.
By the end of this training, participants will be able to:
- Deploy advanced AI algorithms for real-time threat detection.
- Customize AI models to address specific cybersecurity challenges.
- Create automation workflows for effective threat response.
- Protect AI-driven security tools from adversarial attacks.
Blue Team Fundamentals: Security Operations and Analysis
21 HoursThis instructor-led, live training in Brazil (online or onsite) is aimed at intermediate-level IT security professionals who wish to develop skills in security monitoring, analysis, and response.
By the end of this training, participants will be able to:
- Understand the role of a Blue Team in cybersecurity operations.
- Use SIEM tools for security monitoring and log analysis.
- Detect, analyze, and respond to security incidents.
- Perform network traffic analysis and threat intelligence gathering.
- Apply best practices in security operations center (SOC) workflows.
Bug Bounty Hunting
21 HoursBug Bounty Hunting involves locating security weaknesses in software, websites, or systems and reporting them responsibly to receive rewards or recognition.
This instructor-led live training, available online or onsite, is designed for beginner-level security researchers, developers, and IT professionals eager to grasp the fundamentals of ethical bug hunting and learn how to participate in bug bounty programs.
Upon completing this training, participants will be equipped to:
- Grasp the core concepts of vulnerability discovery and bug bounty initiatives.
- Utilize essential tools such as Burp Suite and browser developer tools for application testing.
- Recognize common web security flaws, including XSS, SQLi, and CSRF.
- Submit clear and actionable vulnerability reports to bug bounty platforms.
Course Format
- Interactive lectures and discussions.
- Hands-on practice with bug bounty tools in simulated testing environments.
- Guided exercises focused on discovering, exploiting, and reporting vulnerabilities.
Course Customization Options
- For customized training tailored to your organization's specific applications or testing needs, please contact us to arrange.
Bug Bounty: Advanced Techniques and Automation
21 HoursBug Bounty: Advanced Techniques and Automation offers an in-depth exploration of high-impact vulnerabilities, automation frameworks, reconnaissance strategies, and the tooling tactics employed by top-tier bug bounty hunters.
This instructor-led live training (available online or onsite) is designed for security researchers, penetration testers, and bug bounty hunters at the intermediate to advanced level who aim to streamline their workflows, expand their reconnaissance capabilities, and identify complex vulnerabilities across multiple targets.
Upon completing this training, participants will be equipped to:
- Automate reconnaissance and scanning processes for numerous targets.
- Utilize state-of-the-art tools and scripts for bounty automation.
- Identify complex, logic-based vulnerabilities that go beyond standard scanning capabilities.
- Develop custom workflows for subdomain enumeration, fuzzing, and reporting.
Course Format
- Interactive lectures and discussions.
- Hands-on practice with advanced tools and scripting for automation.
- Guided labs focusing on real-world bounty workflows and advanced attack chains.
Customization Options
- For tailored training based on your specific bounty targets, automation requirements, or internal security challenges, please reach out to us to arrange a customized session.
Cyber Defence (SOC) Analyst Foundation
7 HoursThis instructor-led, live training in Brazil (online or onsite) is designed for security analysts and system administrators with beginner to intermediate experience who seek to establish a foundational understanding of Cyber Defence (SOC) analysis.
Upon completion of this training, participants will be equipped to:
- Grasp the core principles of Security Management within a Cyber Defence framework.
- Apply effective Incident Response strategies to reduce the impact of security breaches.
- Roll out Security Education initiatives to boost organizational awareness and readiness.
- Oversee and analyze Security Information to proactively identify threats.
- Employ Event Management techniques to monitor and address security incidents.
- Execute Vulnerability Management processes to pinpoint and resolve system weaknesses.
- Hone Threat Detection skills to identify and counter potential cyber risks.
- Engage in Simulated Attacks to evaluate and strengthen incident response capabilities.
CHFI - Certified Digital Forensics Examiner
35 HoursThe vendor-neutral Certified Digital Forensics Examiner certification is designed to train Cyber Crime and Fraud Investigators, equipping students with skills in electronic discovery and advanced investigation techniques. This course is essential for anyone who encounters digital evidence during an investigation.
The Certified Digital Forensics Examiner training teaches the methodology for conducting a computer forensic examination. Students will learn to use forensically sound investigative techniques to evaluate the scene, collect and document all relevant information, interview appropriate personnel, maintain chain-of-custody, and write a findings report.
The Certified Digital Forensics Examiner course benefits organizations, individuals, government offices, and law enforcement agencies interested in pursuing litigation, proof of guilt, or corrective action based on digital evidence.
Certified Incident Handler
21 HoursThe Certified Incident Handler program delivers a systematic methodology for managing and responding to cybersecurity incidents with precision and efficiency.
Delivered through live, instructor-led sessions (available online or onsite), this course targets intermediate IT security professionals seeking to acquire the tactical expertise required to plan, classify, contain, and manage security breaches.
Upon completion of this training, participants will be capable of:
- Grasping the incident response lifecycle and its distinct phases.
- Implementing procedures for incident detection, classification, and notification.
- Applying effective strategies for containment, eradication, and recovery.
- Creating post-incident reports and continuous improvement plans.
Course Format
- Interactive lectures and discussions.
- Practical application of incident handling procedures within simulated environments.
- Guided exercises concentrating on detection, containment, and response workflows.
Customization Options
- To arrange customized training tailored to your organization's specific incident response procedures or tools, please reach out to us.
Mastering Continuous Threat Exposure Management (CTEM)
28 HoursThis instructor-led live training, available online or onsite, is designed for intermediate-level cybersecurity professionals who aim to implement CTEM within their organizations.
Upon completing this training, participants will be equipped to:
- Grasp the core principles and stages of CTEM.
- Identify and prioritize risks using established CTEM methodologies.
- Integrate CTEM practices into current security protocols.
- Leverage tools and technologies for continuous threat management.
- Develop strategies to consistently validate and enhance security measures.
Cyber Emergency Response Team (CERT)
7 HoursThis course examines the management of an incident response team. In the context of today's frequent and complex cyber attacks, the role of the first responder and the overall incident response function are critical for organizations.
Incident response serves as the final line of defense. Detecting and responding to incidents efficiently requires robust management processes, and effectively leading an incident response team demands specialized skills and knowledge.
Cyber Threat Intelligence
35 HoursThis instructor-led, live training in Brazil (online or in-person) is designed for advanced-level cybersecurity professionals seeking to understand Cyber Threat Intelligence and develop skills to effectively manage and mitigate cyber threats.
Upon completion of this training, participants will be able to:
- Grasp the fundamentals of Cyber Threat Intelligence (CTI).
- Analyze the current cyber threat landscape.
- Collect and process intelligence data.
- Conduct advanced threat analysis.
- Utilize Threat Intelligence Platforms (TIPs) and automate threat intelligence workflows.
Fundamentals of Corporate Cyber Warfare
14 HoursThis instructor-led, live training in Brazil (online or onsite) explores various facets of enterprise security, ranging from AI to database protection. The curriculum also covers the latest tools, processes, and mindsets required to effectively defend against attacks.
Ethical Hacker
35 HoursThis course immerses participants in an interactive environment, demonstrating how to scan, test, compromise, and secure their own systems. The hands-on lab approach provides each student with deep knowledge and practical experience using today's essential security tools. Participants start by understanding how perimeter defenses operate, then proceed to scan and attack their own networks in a safe, controlled setting where no real infrastructure is harmed. Learners also explore how intruders escalate privileges and the steps required to fortify systems. Additionally, the curriculum covers Intrusion Detection, Policy Development, Social Engineering, DDoS Attacks, Buffer Overflows, and Malware Creation. Upon completing this intensive five-day program, students will possess a practical, hands-on understanding of ethical hacking.
The primary objectives of the Ethical Hacking Training are to:
- Establish and govern baseline standards for certifying professional information security specialists in ethical hacking techniques.
- Assure the public that credentialed professionals meet or exceed these established standards.
- Reinforce ethical hacking as a distinct, self-regulating profession.
Target Audience:
This course is ideal for professionals in roles such as, but not limited to:
- Security Engineers
- Security Consultants
- Security Managers
- IT Directors/Managers
- Security Auditors
- IT Systems Administrators
- IT Network Administrators
- Network Architects
- Developers
Certified Lead Ethical Hacker
35 HoursWhy should you attend?
The Certified Lead Ethical Hacker training course empowers you to develop the necessary expertise to carry out information system penetration tests by applying recognized principles, procedures, and penetration testing techniques. This allows you to identify potential threats within a computer network. Throughout this training, you will acquire the knowledge and skills required to manage a penetration testing project or team, as well as to plan and execute both internal and external pentests, in compliance with various standards such as the Penetration Testing Execution Standard (PTES) and the Open Source Security Testing Methodology Manual (OSSTMM). Additionally, you will gain a comprehensive understanding of how to draft reports and propose countermeasures. Through practical exercises, you will master penetration testing techniques and acquire the skills needed to manage a pentest team, as well as handle customer communication and conflict resolution.
The Certified Lead Ethical Hacking training course provides a technical perspective on information security through ethical hacking, utilizing common techniques such as information gathering and vulnerability detection, both inside and outside a business network.
The training is also aligned with the NICE (The National Initiative for Cybersecurity Education) Protect and Defend framework.
After mastering the necessary knowledge and skills in ethical hacking, you can take the exam and apply for the "PECB Certified Lead Ethical Hacker" credential. By holding a PECB Lead Ethical Hacker certificate, you will demonstrate that you have acquired the practical skills for performing and managing penetration tests according to best practices.
Who should attend?
- Individuals interested in IT Security, particularly in Ethical Hacking, who wish to learn more about the topic or begin a process of professional reorientation.
- Information security officers and professionals seeking to master ethical hacking and penetration testing techniques.
- Managers or consultants wishing to learn how to control the penetration testing process.
- Auditors wishing to perform and conduct professional penetration tests.
- Persons responsible for maintaining the security of information systems within an organization.
- Technical experts who want to learn how to prepare a pentest.
- Cybersecurity professionals and information security team members.
MasterClass Certified Ethical Hacker Program
28 HoursThe Certified Ethical Hacker credential is a highly coveted cybersecurity certification globally.
This program blends instruction with practical application to prepare students for both the CEH certification exam and the CEH Practical Exam. Those who successfully pass both assessments earn the CEH Master credential alongside their CEH certification.
Participants have the option to enhance their package by including either the CPENT or the CHFI course.
Training for either the Certified Penetration Testing Professional (CPENT) course or the Computer Hacking Forensic Investigator (CHFI) course is delivered to each student through EC-Council’s online, self-paced streaming video program.
CPENT (Pen-test):
Instructs students on applying the concepts and tools from the CEH program to a pen-test methodology within a live cyber range.
CHFI (Computer Forensics):
Teaches a methodological approach to computer forensics, covering searching and seizing, chain-of-custody, acquisition, preservation, analysis, and reporting of digital evidence.
Course Description
CEH provides a deep understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It helps you understand how hackers think and act maliciously, positioning you to better secure your infrastructure and defend against future attacks. By understanding system weaknesses and vulnerabilities, organizations can strengthen their security controls to minimize incident risk.
CEH was designed to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to prove the knowledge and skills required to achieve the CEH credential. You will be exposed to a completely different perspective on the responsibilities and measures needed to maintain security.
Who Should Attend
- Law enforcement personnel
- System administrators
- Security officers
- Defense and military personnel
- Legal professionals
- Bankers
- Security professionals
About the Certified Ethical Hacker Master
To earn the CEH Master certification, you must pass the CEH Practical exam. The CEH Practical Exam was designed to allow students to demonstrate their ability to execute the principles taught in the CEH course. The practical exam requires you to show the application of ethical hacking techniques, such as threat vector identification, network scanning, OS detection, vulnerability analysis, system hacking, and more.
The CEH Practical does not involve simulations. Instead, you will challenge a live range designed to mimic a corporate network using live virtual machines, networks, and applications.
Successfully completing the challenges in the CEH Practical Exam is the next step after attaining the Certified Ethical Hacker (CEH) certification. Successfully passing both the CEH exam and the CEH Practical earns you the additional certification of CEH Master.
About the Certified Ethical Hacker Practical
To prove your skills in ethical hacking, we test your abilities with real-world challenges in a real-world environment. This involves using labs and tools that require you to complete specific ethical hacking challenges within a time limit, just as you would in real life.
The EC-Council CEH (Practical) exam consists of a complex network that replicates a large organization’s real-life network, including various network systems (such as DMZ, Firewalls, etc.). You must apply your ethical hacking skills to discover and exploit real-time vulnerabilities while also auditing the systems.
About CPENT
EC-Council’s Certified Penetration Tester (CPENT) program focuses entirely on pen-testing. It teaches you how to operate in an enterprise network environment that must be attacked, exploited, evaded, and defended. If you have only worked in flat networks, CPENT’s live practice range will help you take your skills to the next level by teaching you to pen-test IoT systems, OT systems, write your own exploits, build your own tools, conduct advanced binary exploitation, double pivot to access hidden networks, and customize scripts and exploits to penetrate the innermost segments of the network.
About CHFI
The Computer Hacking Forensic Investigator (CHFI) course delivers the security discipline of digital forensics from a vendor-neutral perspective. CHFI is a comprehensive course covering major forensic investigation scenarios and enabling students to gain necessary hands-on experience with various forensic investigation techniques and standard forensic tools required to successfully carry out a computer forensic investigation.