What You Need to Know Before
You Start
Starts 8 June 2025 05:10
Ends 8 June 2025
00
days
00
hours
00
minutes
00
seconds
Becoming a Dark Knight - Adversary Emulation Demonstration for ATT&CK Evaluations
Explore adversary emulation for cybersecurity, learning how to study advanced threats, develop scenarios, and execute operations to improve industry defenses through MITRE ATT&CK Evaluations.
Black Hat
via YouTube
Black Hat
2544 Courses
43 minutes
Optional upgrade avallable
Not Specified
Progress at your own speed
Conference Talk
Optional upgrade avallable
Overview
Explore adversary emulation for cybersecurity, learning how to study advanced threats, develop scenarios, and execute operations to improve industry defenses through MITRE ATT&CK Evaluations.
Syllabus
- Introduction to Adversary Emulation
- Understanding Advanced Threats
- The MITRE ATT&CK Framework in Detail
- Developing Emulation Scenarios
- Planning and Execution of Emulation Operations
- Measuring and Improving Defenses
- Legal and Ethical Considerations
- Hands-on Labs and Simulations
- Review and Continuous Learning
- Conclusion and Future Directions
Definition and importance in cybersecurity
Overview of MITRE ATT&CK Framework
Key objectives and outcomes of adversary emulation
Types of advanced threats and APTs (Advanced Persistent Threats)
Case studies and historical analyses
Identifying threat actors and their techniques
Structure and components of ATT&CK
Use cases for ATT&CK in adversary emulation
Mapping adversary behavior to ATT&CK tactics and techniques
Creating realistic threat scenarios
Selection of tools and techniques for scenario development
Risk assessment and prioritizing threats
Building an emulation plan
Execution of operations within a controlled environment
Use of red teaming tools and platforms
Monitoring and detection during emulation activities
Reporting findings from ATT&CK Evaluations
Incorporating results into security strategy and posture
Guidelines for ethical operation of adversary emulations
Compliance with legal frameworks and organizational policies
Practical exercises with threat emulation tools
Simulated attack scenarios and defenses testing
Collaborative projects to develop custom emulation scenarios
Evaluating the effectiveness of emulation activities
Resources for staying updated with emerging threats and techniques
Building a community of practice around adversary emulation
Summary of key learnings
Future of adversary emulation in cybersecurity
Career opportunities and path forward in threat intelligence and emulation
Subjects
Conference Talks