Course Outline

Introduction

What is Malware?

  • Types of malware for government use
  • The evolution of malware

Overview of Malware Attacks

  • Propagating attacks
  • Non-propagating attacks

Matrices of ATT&CK

  • Enterprise ATT&CK
  • Pre-ATT&CK
  • Mobile ATT&CK

MITRE ATT&CK

  • Eleven tactics for government cybersecurity
  • Techniques and procedures

Preparing the Development Environment for Government

  • Setting up a version control center (GitHub)
  • Downloading a project that hosts a to-do list system of data
  • Installing and configuring ATT&CK Navigator

Monitoring a Compromised System Using WMI

  • Implementing command line scripts to conduct a lateral attack
  • Utilizing ATT&CK Navigator to identify the compromise
  • Assessing the compromise through the ATT&CK framework
  • Performing process monitoring
  • Documenting and patching vulnerabilities in the defense architecture

Monitoring a Compromised System Using EternalBlue

  • Implementing command line scripts to conduct a lateral attack
  • Utilizing ATT&CK Navigator to identify the compromise
  • Assessing the compromise through the ATT&CK framework
  • Performing process monitoring
  • Documenting and patching vulnerabilities in the defense architecture

Summary and Conclusion for Government Use

Requirements

  • An understanding of information system security for government

Audience

  • Information systems analysts for government
 7 Hours

Number of participants


Price per participant

Testimonials (2)

Upcoming Courses

Related Categories