MITRE ATT&CK Training Course
The MITRE ATT&CK framework is a comprehensive resource of tactics and techniques used to categorize cyber attacks and assess an organization's risk. This framework enhances awareness of security vulnerabilities within an organization, identifies gaps in defenses, and prioritizes risk mitigation strategies.
This instructor-led, live training (available online or onsite) is designed for information system analysts who aim to utilize MITRE ATT&CK to reduce the risk of a security compromise for government agencies.
By the end of this training, participants will be able to:
- Set up the necessary development environment to start implementing MITRE ATT&CK.
- Categorize how attackers interact with systems.
- Document adversary behaviors within organizational systems.
- Track attacks, analyze patterns, and evaluate existing defense tools.
Format of the Course
- Interactive lectures and discussions.
- Extensive exercises and practice sessions.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, tailored to specific needs for government, please contact us to arrange.
Course Outline
Introduction
What is Malware?
- Types of malware
- The evolution of malware
Overview of Malware Attacks
- Propagating attacks
- Non-propagating attacks
Matrices of ATT&CK
- Enterprise ATT&CK
- Pre-ATT&CK
- Mobile ATT&CK
MITRE ATT&CK
- 11 tactics for government
- Techniques
- Procedures
Preparing the Development Environment
- Setting up a version control center (GitHub) for government use
- Downloading a project that hosts a to-do list system of data for government applications
- Installing and configuring ATT&CK Navigator for government systems
Monitoring a Compromised System (WMI)
- Instating command line scripts to conduct a lateral attack for government networks
- Utilizing ATT&CK Navigator to identify the compromise in government systems
- Assessing the compromise through the ATT&CK framework for government cybersecurity
- Performing process monitoring for government operations
- Documenting and patching vulnerabilities in the defense architecture for government security
Monitoring a Compromised System (EternalBlue)
- Instating command line scripts to conduct a lateral attack for government networks
- Utilizing ATT&CK Navigator to identify the compromise in government systems
- Assessing the compromise through the ATT&CK framework for government cybersecurity
- Performing process monitoring for government operations
- Documenting and patching vulnerabilities in the defense architecture for government security
Summary and Conclusion
Requirements
- An understanding of information system security for government
Audience
- Information systems analysts in the public sector
Runs with a minimum of 4 + people. For 1-to-1 or private group training, request a quote.
MITRE ATT&CK Training Course - Booking
MITRE ATT&CK Training Course - Enquiry
MITRE ATT&CK - Consultancy Enquiry
Consultancy Enquiry
Testimonials (2)
- Understanding that ATT&CK creates a map that makes it easy to see, where an organization is protected and where the vulnerable areas are. Then to identify the security gaps that are most significant from a risk perspective. - Learn that each technique comes with a list of mitigations and detections that incident response teams can employ to detect and defend. - Learn about the various sources and communities for deriving Defensive Recommendations.
CHU YAN LEE - PacificLight Power Pte Ltd
Course - MITRE ATT&CK
All is excellent
Manar Abu Talib - Dubai Electronic Security Center
Course - MITRE ATT&CK
Upcoming Courses
Related Courses
AI-Powered Cybersecurity: Threat Detection & Response
21 HoursCyber Defence (SOC) Analyst Foundation
7 HoursCHFI - Certified Digital Forensics Examiner
35 HoursMastering Continuous Threat Exposure Management (CTEM)
28 HoursCyber Emergency Response Team (CERT)
7 HoursCyber Threat Intelligence
35 HoursFundamentals of Corporate Cyber Warfare
14 HoursThis instructor-led, live training in US (online or onsite) for government covers the various aspects of enterprise security, ranging from artificial intelligence to database protection. The course also includes an overview of the latest tools, processes, and strategies necessary to defend against cyber threats.
Digital Investigations - Advanced
21 HoursEthical Hacker
35 HoursCertified Lead Ethical Hacker
35 HoursWhy Should You Attend?
The Certified Lead Ethical Hacker training course equips you with the essential expertise to conduct information system penetration tests by applying recognized principles, procedures, and techniques. This course will help you identify potential threats on computer networks and manage a penetration testing project or team effectively. During the training, you will learn how to plan and perform both internal and external penetration tests in compliance with standards such as the Penetration Testing Execution Standard (PTES) and the Open Source Security Testing Methodology Manual (OSSTMM). Additionally, you will gain a comprehensive understanding of drafting reports and proposing countermeasures. Through practical exercises, you will master penetration testing techniques and develop skills in managing a pentest team, customer communication, and conflict resolution.
This training provides a technical overview of information security through ethical hacking, using common methods like information gathering and vulnerability detection within and outside business networks. The course is aligned with the NICE (National Initiative for Cybersecurity Education) Protect and Defend framework, ensuring that it meets industry standards and best practices.
After acquiring the necessary knowledge and skills in ethical hacking, you can take the exam to earn the "PECB Certified Lead Ethical Hacker" credential. Holding this certificate demonstrates your proficiency in performing and managing penetration tests according to established best practices, which is crucial for government and private sector roles alike.
Who Should Attend?
- Individuals interested in IT security and ethical hacking, whether to deepen their knowledge or explore a career change.
- Information security officers and professionals seeking to master ethical hacking and penetration testing techniques.
- Managers and consultants who want to learn how to oversee the penetration testing process effectively.
- Auditors aiming to conduct professional penetration tests.
- Personnel responsible for maintaining the security of information systems in an organization.
- Technical experts looking to prepare for and execute pentests.
- Cybersecurity professionals and members of information security teams who need advanced skills for their roles.
Understanding and Managing the Threat of Malware
7 HoursMalware Analysis (PCAP)
35 HoursFormat of the Course
- Interactive lecture and discussion sessions.
- Comprehensive exercises and practical activities.
- Hands-on implementation in a live-lab environment.
Course Customization Options for Government
- To request a customized training program tailored to specific agency needs, please contact us to arrange.
MasterClass Certified Ethical Hacker Program
28 HoursThe Certified Ethical Hacker (CEH) certification is highly sought after in the field of cybersecurity, both domestically and internationally.
This program includes comprehensive instruction and practical exercises designed to prepare students for the CEH certification exam and the CEH Practical Exam. Successfully passing both exams confers the CEH Master credential along with the CEH certification.
Students have the option to add either the CPENT or the CHFI course to their training package.
The Certified Penetration Testing Professional (CPENT) course or the Computer Hacking Forensic Investigator (CHFI) course will be provided to each student through EC-Council’s online, self-paced, streaming video program for government use.
CPENT (Pen-test):
This course teaches students how to apply the concepts and tools covered in the CEH program to a penetration testing methodology within a live cyber range environment.
CHFI (Computer Forensics):
This course provides a methodological approach to computer forensics, including techniques for searching and seizing digital evidence, maintaining chain-of-custody, acquiring, preserving, analyzing, and reporting on digital evidence.
Course Description
The CEH program offers an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will equip you with the knowledge to understand how hackers think and operate maliciously, thereby enabling you to better secure your organization’s infrastructure and defend against future attacks. An awareness of system weaknesses and vulnerabilities helps organizations enhance their security controls and minimize the risk of incidents.
The CEH curriculum is designed to provide a hands-on environment and systematic process across each ethical hacking domain and methodology, giving students the opportunity to demonstrate the knowledge and skills necessary to earn the CEH credential. You will gain a new perspective on the responsibilities and measures required to maintain security.
Who Should Attend
- Law enforcement personnel
- System administrators
- Security officers
- Defense and military personnel
- Legal professionals
- Bankers
- Security professionals
About the Certified Ethical Hacker Master
To earn the CEH Master certification, you must pass the CEH Practical exam. The CEH Practical Exam is designed to assess students' ability to apply the principles taught in the CEH course. This practical exam requires you to demonstrate ethical hacking techniques such as threat vector identification, network scanning, OS detection, vulnerability analysis, system hacking, and more.
The CEH Practical does not include simulations; instead, it involves challenging a live range that mimics a corporate network using live virtual machines, networks, and applications. Successfully completing the challenges in the CEH Practical Exam is the next step after obtaining the Certified Ethical Hacker (CEH) certification. Passing both the CEH exam and the CEH Practical will earn you the additional certification of CEH Master.
About the Certified Ethical Hacker Practical
To demonstrate your proficiency in ethical hacking, we assess your abilities through real-world challenges in a realistic environment. This involves using labs and tools to complete specific ethical hacking tasks within a time limit, mirroring real-world scenarios.
The EC-Council CEH (Practical) exam features a complex network that simulates a large organization’s real-life network infrastructure, including various systems such as DMZs and firewalls. You must apply your ethical hacking skills to discover and exploit live vulnerabilities while also auditing the systems.
About CPENT
EC-Council’s Certified Penetration Tester (CPENT) program focuses on penetration testing in an enterprise network environment that requires attack, exploitation, evasion, and defense. If you have experience working only in flat networks, CPENT’s live practice range will elevate your skills by teaching you to test IoT systems, OT systems, write your own exploits, build custom tools, conduct advanced binary exploitation, double pivot to access hidden networks, and customize scripts and exploits to penetrate the innermost segments of a network.
About CHFI
The Computer Hacking Forensic Investigator (CHFI) course provides a vendor-neutral perspective on digital forensics. This comprehensive program covers major forensic investigation scenarios and equips students with hands-on experience in various forensic techniques and standard forensic tools necessary for conducting successful computer forensic investigations.
SC-200T00: Microsoft Security Operations Analyst
28 HoursLearn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender. This course is designed to help you mitigate cyberthreats using these technologies, specifically by configuring and utilizing Azure Sentinel and Kusto Query Language (KQL) for detection, analysis, and reporting. It is tailored for individuals in Security Operations roles and helps prepare learners for the exam SC-200: Microsoft Security Operations Analyst.
Audience Profile
The Microsoft Security Operations Analyst collaborates with organizational stakeholders to secure information technology systems for government and private organizations. Their primary goal is to reduce risk by rapidly remediating active attacks, advising on improvements to threat protection practices, and referring policy violations to appropriate stakeholders. Responsibilities include threat management, monitoring, and response using a variety of security solutions across the environment. The role primarily involves investigating, responding to, and hunting for threats using Microsoft Azure Sentinel, Azure Defender, Microsoft 365 Defender, and third-party security products. As these tools are critical for operational output, Security Operations Analysts are also key stakeholders in their configuration and deployment.
Job Role: Security Engineer
Preparation for Exam: SC-200
Features: None
Skills Gained
- Explain how Microsoft Defender for Endpoint can mitigate risks in your environment
- Create a Microsoft Defender for Endpoint environment
- Configure Attack Surface Reduction rules on Windows 10 devices
- Perform actions on a device using Microsoft Defender for Endpoint
- Investigate domains and IP addresses in Microsoft Defender for Endpoint
- Investigate user accounts in Microsoft Defender for Endpoint
- Configure alert settings in Microsoft Defender for Endpoint
- Explain the evolving threat landscape
- Conduct advanced hunting in Microsoft 365 Defender
- Manage incidents in Microsoft 365 Defender
- Explain how Microsoft Defender for Identity can mitigate risks in your environment
- Investigate DLP alerts in Microsoft Cloud App Security
- Explain the types of actions you can take on an insider risk management case
- Configure auto-provisioning in Azure Defender
- Remediate alerts in Azure Defender
- Construct KQL statements
- Filter searches based on event time, severity, domain, and other relevant data using KQL
- Extract data from unstructured string fields using KQL
- Manage an Azure Sentinel workspace
- Use KQL to access the watchlist in Azure Sentinel
- Manage threat indicators in Azure Sentinel
- Explain the differences between Common Event Format and Syslog connectors in Azure Sentinel
- Connect Azure Windows Virtual Machines to Azure Sentinel
- Configure Log Analytics agent to collect Sysmon events
- Create new analytics rules and queries using the analytics rule wizard
- Create a playbook to automate incident response
- Use queries to hunt for threats
- Observe threats over time with livestream