Course Outline

Introduction

What is Malware?

  • Types of malware
  • The evolution of malware

Overview of Malware Attacks

  • Propagating attacks
  • Non-propagating attacks

Matrices of ATT&CK

  • Enterprise ATT&CK
  • Pre-ATT&CK
  • Mobile ATT&CK

MITRE ATT&CK

  • 11 tactics for government
  • Techniques
  • Procedures

Preparing the Development Environment

  • Setting up a version control center (GitHub) for government use
  • Downloading a project that hosts a to-do list system of data for government applications
  • Installing and configuring ATT&CK Navigator for government systems

Monitoring a Compromised System (WMI)

  • Instating command line scripts to conduct a lateral attack for government networks
  • Utilizing ATT&CK Navigator to identify the compromise in government systems
  • Assessing the compromise through the ATT&CK framework for government cybersecurity
  • Performing process monitoring for government operations
  • Documenting and patching vulnerabilities in the defense architecture for government security

Monitoring a Compromised System (EternalBlue)

  • Instating command line scripts to conduct a lateral attack for government networks
  • Utilizing ATT&CK Navigator to identify the compromise in government systems
  • Assessing the compromise through the ATT&CK framework for government cybersecurity
  • Performing process monitoring for government operations
  • Documenting and patching vulnerabilities in the defense architecture for government security

Summary and Conclusion

Requirements

  • An understanding of information system security for government

Audience

  • Information systems analysts in the public sector
 7 Hours

Number of participants


Price per participant

Testimonials (2)

Upcoming Courses

Related Categories