MITRE ATT&CK Training Course
MITRE ATT&CK is a framework that categorizes tactics and techniques used in cyber attacks, helping organizations assess their risk levels. This framework enhances security awareness by identifying vulnerabilities and prioritizing risks within an organization’s defenses.
This instructor-led, live training (available online or on-site) is designed for information system analysts who aim to use MITRE ATT&CK to reduce the likelihood of a security breach.
By the end of this training, participants will be able to:
- Set up the required development environment to start implementing MITRE ATT&CK effectively.
- Classify how attackers engage with systems and networks.
- Document the behaviors of adversaries within organizational systems.
- Monitor attacks, analyze patterns, and evaluate the effectiveness of existing defense tools.
Format of the Course
- Interactive lectures and discussions.
- A wide range of exercises and practical activities.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange the details.
Course Outline
Introduction
What is Malware?
- Types of malware
- The evolution of malware
Overview of Malware Attacks
- Propagating
- Non-propagating
Matrices of ATT&CK
- Enterprise ATT&CK
- Pre-ATT&CK
- Mobile ATT&CK
MITRE ATT&CK
- 11 tactics
- Techniques
- Procedures
Preparing the Development Environment
- Setting up a version control center (GitHub)
- Downloading a project that hosts a to-do list system of data
- Installing and configuring ATT&CK Navigator
Monitoring a compromised system (WMI)
- Instating command line scripts to conduct a lateral attack
- Utilizing ATT&CK Navigator to identify the compromise
- Assesing the compromise through the ATT&CK framework
- Performing process monitoring
- Documenting and patching the holes in the defense architecture
Monitoring a compromised system (EternalBlue)
- Instating command line scripts to conduct a lateral attack
- Utilizing ATT&CK Navigator to identify the compromise
- Assesing the compromise through the ATT&CK framework
- Performing process monitoring
- Documenting and patching the holes in the defense architecture
Summary and Conclusion
Requirements
- An understanding of information system security
Audience
- Information systems analysts
Open Training Courses require 5+ participants.
MITRE ATT&CK Training Course - Booking
MITRE ATT&CK Training Course - Enquiry
MITRE ATT&CK - Consultancy Enquiry
Testimonials (2)
- Understanding that ATT&CK creates a map that makes it easy to see, where an organization is protected and where the vulnerable areas are. Then to identify the security gaps that are most significant from a risk perspective. - Learn that each technique comes with a list of mitigations and detections that incident response teams can employ to detect and defend. - Learn about the various sources and communities for deriving Defensive Recommendations.
CHU YAN LEE - PacificLight Power Pte Ltd
Course - MITRE ATT&CK
All is excellent
Manar Abu Talib - Dubai Electronic Security Center
Course - MITRE ATT&CK
Upcoming Courses
Related Courses
AI-Powered Cybersecurity: Threat Detection & Response
21 HoursThis instructor-led, live training in Norway (online or onsite) is aimed at beginner-level cybersecurity professionals who wish to learn how to leverage AI for improved threat detection and response capabilities.
By the end of this training, participants will be able to:
- Understand AI applications in cybersecurity.
- Implement AI algorithms for threat detection.
- Automate incident response with AI tools.
- Integrate AI into existing cybersecurity infrastructure.
AI-Powered Cybersecurity: Advanced Threat Detection & Response
28 HoursThis instructor-led, live training in Norway (online or onsite) is aimed at intermediate-level to advanced-level cybersecurity professionals who wish to elevate their skills in AI-driven threat detection and incident response.
By the end of this training, participants will be able to:
- Implement advanced AI algorithms for real-time threat detection.
- Customize AI models for specific cybersecurity challenges.
- Develop automation workflows for threat response.
- Secure AI-driven security tools against adversarial attacks.
Blue Team Fundamentals: Security Operations and Analysis
21 HoursThis instructor-led, live training in Norway (online or onsite) is aimed at intermediate-level IT security professionals who wish to develop skills in security monitoring, analysis, and response.
By the end of this training, participants will be able to:
- Understand the role of a Blue Team in cybersecurity operations.
- Use SIEM tools for security monitoring and log analysis.
- Detect, analyze, and respond to security incidents.
- Perform network traffic analysis and threat intelligence gathering.
- Apply best practices in security operations center (SOC) workflows.
Bug Bounty Hunting
21 HoursBug Bounty Hunting involves identifying security vulnerabilities in software, websites, or systems and reporting them responsibly to earn rewards or recognition.
This instructor-led, live training (available online or onsite) is designed for beginner-level security researchers, developers, and IT professionals who want to learn the basics of ethical bug hunting and how to take part in bug bounty programs.
By the end of this training, participants will be able to:
- Grasp the fundamental concepts of vulnerability discovery and bug bounty programs.
- Utilize essential tools like Burp Suite and browser developer tools for application testing.
- Recognize common web security issues such as XSS, SQLi, and CSRF.
- Submit clear and actionable vulnerability reports to bug bounty platforms.
Format of the Course
- Interactive lectures and discussions.
- Practical use of bug bounty tools in simulated testing environments.
- Guided exercises focused on identifying, exploiting, and reporting vulnerabilities.
Course Customization Options
- To request a customized training tailored to your organization's applications or testing requirements, please contact us to arrange.
Bug Bounty: Advanced Techniques and Automation
21 HoursBug Bounty: Advanced Techniques and Automation delves deeply into high-impact vulnerabilities, automation frameworks, reconnaissance techniques, and the tooling strategies employed by top-tier bug bounty hunters.
This instructor-led, live training (available both online and onsite) is designed for intermediate to advanced security researchers, penetration testers, and bug bounty hunters who aim to automate their workflows, scale their reconnaissance efforts, and uncover complex vulnerabilities across multiple targets.
By the end of this training, participants will be able to:
- Automate reconnaissance and scanning processes for multiple targets.
- Utilize cutting-edge tools and scripts commonly used in bounty automation.
- Identify complex, logic-based vulnerabilities that go beyond standard scans.
- Develop custom workflows for subdomain enumeration, fuzzing, and reporting.
Format of the Course
- Interactive lectures and discussions.
- Hands-on experience with advanced tools and scripting for automation.
- Guided labs focused on real-world bounty workflows and sophisticated attack chains.
Course Customization Options
- For a customized training tailored to your specific bounty targets, automation requirements, or internal security challenges, please contact us to arrange.
Cyber Defence (SOC) Analyst Foundation
7 HoursThis instructor-led, live training in Norway (online or onsite) is aimed at beginner to intermediate-level security analysts and system administrators who wish to establish a foundational understanding of Cyber Defence (SOC) analysis.
By the end of this training, participants will be able to:
- Understand the principles of Security Management in a Cyber Defence context.
- Execute effective Incident Response strategies to mitigate security incidents.
- Implement Security Education practices to enhance organizational awareness and preparedness.
- Manage and analyze Security Information for proactive threat identification.
- Utilize Event Management techniques to monitor and respond to security events.
- Implement Vulnerability Management processes to identify and address system vulnerabilities.
- Develop skills in Threat Detection to identify and respond to potential cyber threats.
- Participate in Simulated Attacks to test and improve incident response capabilities.
CHFI - Certified Digital Forensics Examiner
35 HoursThe Certified Digital Forensics Examiner vendor-neutral certification is designed to train cyber crime and fraud investigators. Students are taught electronic discovery and advanced investigation techniques, making this course essential for anyone who encounters digital evidence during an investigation.
The Certified Digital Forensics Examiner training provides a comprehensive methodology for conducting computer forensic examinations. Students will learn forensically sound investigative techniques to evaluate the scene, collect and document all relevant information, interview appropriate personnel, maintain chain-of-custody, and write detailed findings reports.
This course is beneficial for organizations, individuals, government offices, and law enforcement agencies that are interested in pursuing litigation, proving guilt, or taking corrective action based on digital evidence.
Certified Incident Handler
21 HoursThe Certified Incident Handler course offers a structured approach to managing and responding to cybersecurity incidents effectively and efficiently.
This instructor-led, live training (available both online and onsite) is designed for intermediate-level IT security professionals who want to develop the tactical skills and knowledge necessary to plan, classify, contain, and manage security incidents.
By the end of this training, participants will be able to:
- Understand the incident response lifecycle and its various phases.
- Implement incident detection, classification, and notification procedures.
- Effectively apply containment, eradication, and recovery strategies.
- Create post-incident reporting and continuous improvement plans.
Format of the Course
- Interactive lectures and discussions.
- Hands-on practice using incident handling procedures in simulated scenarios.
- Guided exercises focusing on detection, containment, and response workflows.
Course Customization Options
- To request a customized training tailored to your organization's incident response procedures or tools, please contact us to arrange.
Mastering Continuous Threat Exposure Management (CTEM)
28 HoursThis instructor-led, live training in Norway (online or onsite) is aimed at intermediate-level cybersecurity professionals who wish to implement CTEM in their organizations.
By the end of this training, participants will be able to:
- Understand the principles and stages of CTEM.
- Identify and prioritize risks using CTEM methodologies.
- Integrate CTEM practices into existing security protocols.
- Utilize tools and technologies for continuous threat management.
- Develop strategies to validate and improve security measures continuously.
Cyber Emergency Response Team (CERT)
7 HoursThis course explores how to manage an incident response team, focusing on the role of the first responder. Given the increasing frequency and complexity of today's cyber attacks, incident response is a crucial function for organizations.
Incident response serves as the final line of defense. Detecting and responding efficiently to incidents demands robust management processes. Managing an incident response team necessitates specialized skills and knowledge.
Cyber Threat Intelligence
35 HoursThis instructor-led, live training in Norway (online or onsite) is aimed at advanced-level cyber security professionals who wish to understand Cyber Threat Intelligence and learn skills to effectively manage and mitigate cyber threats.
By the end of this training, participants will be able to:
- Understand the fundamentals of Cyber Threat Intelligence (CTI).
- Analyze the current cyber threat landscape.
- Collect and process intelligence data.
- Perform advanced threat analysis.
- Leverage Threat Intelligence Platforms (TIPs) and automate threat intelligence processes.
Fundamentals of Corporate Cyber Warfare
14 HoursThis instructor-led, live training in Norway (online or onsite) covers the different aspects of enterprise security, from AI to database security. It also includes coverage of the latest tools, processes and mindset needed to protect from attacks.
Ethical Hacker
35 HoursThis course will immerse students in an interactive environment where they will learn how to scan, test, hack, and secure their own systems. The lab-intensive setting provides each student with comprehensive knowledge and practical experience with the current essential security systems. Students will start by understanding how perimeter defenses function and then progress to scanning and attacking their own networks—no real network is compromised in this process. They will also learn about how intruders escalate privileges and the steps necessary to secure a system. Additionally, students will gain insights into Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, and Virus Creation. By the end of this intensive 5-day course, students will have hands-on understanding and experience in Ethical Hacking.
The purpose of the Ethical Hacking Training is to:
- Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures.
- Inform the public that credentialed individuals meet or exceed these minimum standards.
- Reinforce ethical hacking as a unique and self-regulating profession.
Audience:
The course is ideal for professionals working in positions such as, but not limited to:
- Security Engineers
- Security Consultants
- Security Managers
- IT Directors/Managers
- Security Auditors
- IT Systems Administrators
- IT Network Administrators
- Network Architects
- Developers
Certified Lead Ethical Hacker
35 HoursWhy should you attend?
The Certified Lead Ethical Hacker training course equips you with the essential skills to conduct information system penetration tests by employing recognized principles, procedures, and penetration testing techniques. This allows you to identify potential threats within a computer network effectively. Throughout this course, you will acquire the knowledge and expertise needed to manage a penetration testing project or team, as well as plan and execute both internal and external pentests in line with various standards such as the Penetration Testing Execution Standard (PTES) and the Open Source Security Testing Methodology Manual (OSSTMM). Additionally, you will gain a deep understanding of how to draft comprehensive reports and propose effective countermeasures. Through practical exercises, you will master penetration testing techniques and develop the necessary skills for managing a pentest team, as well as enhancing customer communication and conflict resolution.
The Certified Lead Ethical Hacking training course offers a technical perspective on information security through ethical hacking, focusing on common techniques like information gathering and vulnerability detection within and outside a business network.
This training aligns with the NICE (The National Initiative for Cybersecurity Education) Protect and Defend framework.
After acquiring the necessary knowledge and skills in ethical hacking, you can take the exam and apply for the "PECB Certified Lead Ethical Hacker" credential. Holding a PECB Lead Ethical Hacker certificate will demonstrate your proficiency in performing and managing penetration tests according to best practices.
Who should attend?
- Individuals interested in IT Security, particularly those looking to learn more about ethical hacking or considering a career change in this field.
- Information security officers and professionals aiming to master ethical hacking and penetration testing techniques.
- Managers or consultants who want to understand how to oversee the penetration testing process.
- Auditors seeking to perform and conduct professional penetration tests.
- Personnel responsible for maintaining the security of information systems within an organization.
- Technical experts interested in learning how to prepare a pentest.
- Cybersecurity professionals and members of information security teams.
MasterClass Certified Ethical Hacker Program
28 HoursThe Certified Ethical Hacker certification is a highly sought-after cybersecurity credential worldwide.
This program combines instruction and practical exercises to prepare students for both the CEH certification exam and the CEH Practical Exam. Successfully passing both exams earns candidates the prestigious CEH Master designation as well as their CEH certification.
Students have the option to add either the CPENT or the CHFI course to their package.
Training for either the Certified Penetration Testing Professional (CPENT) course or the Computer Hacking Forensic Investigator (CHFI) course is provided through EC-Council’s online, self-paced streaming video program.
CPENT (Pen-test):
This course teaches students how to apply the concepts and tools learned in the CEH program to a penetration testing methodology using a live cyber range.
CHFI (Computer Forensics):
Students learn a methodical approach to computer forensics, including techniques for searching and seizing evidence, maintaining chain-of-custody, acquiring and preserving data, analyzing digital evidence, and reporting findings.
Course Description
The CEH program provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventive countermeasures. It teaches you how hackers think and operate maliciously, enabling you to better secure your organization’s infrastructure and defend against future attacks. Understanding system weaknesses and vulnerabilities helps organizations strengthen their security controls to minimize the risk of incidents.
The CEH program is designed with a hands-on approach and systematic process across each ethical hacking domain and methodology, giving you the opportunity to demonstrate the knowledge and skills required for the CEH credential. You will gain a new perspective on the responsibilities and measures needed to ensure security.
Who Should Attend
- Law enforcement personnel
- System administrators
- Security officers
- Defense and military personnel
- Legal professionals
- Bankers
- Security professionals
About the Certified Ethical Hacker Master
To earn the CEH Master certification, you must pass the CEH Practical exam. The CEH Practical Exam is designed to test your ability to apply the principles taught in the CEH course. It requires you to demonstrate ethical hacking techniques such as threat vector identification, network scanning, OS detection, vulnerability analysis, system hacking, and more.
The CEH Practical does not use simulations; instead, it challenges you with a live range that mimics a corporate network using live virtual machines, networks, and applications.
Successfully completing the challenges in the CEH Practical Exam is the next step after obtaining the Certified Ethical Hacker (CEH) certification. Passing both the CEH exam and the CEH Practical will earn you the additional CEH Master certification.
About the Certified Ethical Hacker Practical
To demonstrate your proficiency in ethical hacking, we assess your skills through real-world challenges in a live environment. You will use labs and tools to complete specific ethical hacking tasks within a time limit, just as you would face in actual scenarios.
The EC-Council CEH (Practical) exam features a complex network that replicates a large organization’s real-life network, including various systems such as DMZs and firewalls. You must apply your ethical hacking skills to discover and exploit vulnerabilities in real-time while also auditing the systems.
About CPENT
EC-Council’s Certified Penetration Tester (CPENT) program focuses on penetration testing in an enterprise network environment that requires attack, exploitation, evasion, and defense. If you have experience only with flat networks, CPENT’s live practice range will elevate your skills by teaching you to test IoT systems, OT systems, write your own exploits, build tools, conduct advanced binary exploitation, double pivot to access hidden networks, and customize scripts and exploits for deep network penetration.
About CHFI
The Computer Hacking Forensic Investigator (CHFI) course covers the security discipline of digital forensics from a vendor-neutral perspective. It is a comprehensive program that includes major forensic investigation scenarios, providing students with hands-on experience in various forensic techniques and standard tools necessary for successful computer forensic investigations.