MITRE ATT&CK Defender™ ATT&CK® Adversary Emulation

via Cybrary

Cybrary

34 Courses


Overview

This course is geared towards seasoned cybersecurity experts looking to emulate real-world threats to gauge cybersecurity measures effectively. Ideal participants include those who have completed the MITRE ATT&CK® Defender™ (MAD) ATT&CK Fundamentals Training, are skilled in managing Windows and Linux systems via the command line, understand basic networking concepts like the OSI Model and TCP/IP, are experienced in using Virtual Machine software such as VMWare or VirtualBox, and are familiar with typical red team/pentester tools and techniques such as Kali Linux, Metasploit, Nmap, and Mimikatz.

By taking this course, you will understand the purpose and utility of cyber adversary emulation, utilize the MITRE ATT&CK Framework to plan emulation activities effectively, leverage cyber threat intelligence to choose relevant emulated threats, apply real-world cyber threats' tactics, techniques, and procedures (TTPs), and execute these TTPs to refine cybersecurity measures. Moreover, this course enables you to use the MITRE ATT&CK Framework to document and communicate emulation findings and recommendations for enhancements.

What sets this course apart is that it is a part of the MITRE ATT&CK® Defender™ (MAD) cybersecurity training and certification program, crafted by MITRE’s specialists. The course is led by Michael C. Long II, a principal cyber adversary emulation engineer at MITRE, ensuring you learn from a top expert in the field. Available exclusively on Cybrary, this course offers the flexibility to learn at your pace from leading figures in cybersecurity.

Provider: Cybrary. Categories: Cybersecurity Courses.

Syllabus


Taught by


Tags

provider Cybrary

Cybrary

34 Courses


Cybrary

pricing Paid Course
language English
duration 8-9 hours
sessions On-Demand
level Intermediate