MITRE ATT&CK Training Course
MITRE ATT&CK is a comprehensive framework of tactics and techniques designed to classify cyberattacks and evaluate an organization's risk posture. By leveraging ATT&CK, organizations can enhance their security awareness, identify vulnerabilities in their defenses, and prioritize remediation efforts based on risk.
This instructor-led live training, available either online or onsite, is tailored for information system analysts aiming to utilize MITRE ATT&CK to mitigate the risk of security breaches.
Upon completion of this training, participants will be able to:
- Establish the necessary development environment to begin implementing MITRE ATT&CK.
- Classify methods by which attackers interact with systems.
- Document adversary behaviors observed within systems.
- Track attacks, identify patterns, and evaluate the effectiveness of existing defense tools.
Course Format
- Interactive lectures and discussions.
- Extensive exercises and practice sessions.
- Hands-on implementation within a live lab environment.
Course Customization Options
- To request customized training for this course, please contact us to arrange.
Course Outline
Introduction
What is Malware?
- Types of malware
- The evolution of malware
Overview of Malware Attacks
- Propagating
- Non-propagating
Matrices of ATT&CK
- Enterprise ATT&CK
- Pre-ATT&CK
- Mobile ATT&CK
MITRE ATT&CK
- 11 tactics
- Techniques
- Procedures
Preparing the Development Environment
- Setting up a version control center (GitHub)
- Downloading a project that hosts a to-do list system of data
- Installing and configuring ATT&CK Navigator
Monitoring a compromised system (WMI)
- Instating command line scripts to conduct a lateral attack
- Utilizing ATT&CK Navigator to identify the compromise
- Assessing the compromise through the ATT&CK framework
- Performing process monitoring
- Documenting and patching the holes in the defense architecture
Monitoring a compromised system (EternalBlue)
- Instating command line scripts to conduct a lateral attack
- Utilizing ATT&CK Navigator to identify the compromise
- Assessing the compromise through the ATT&CK framework
- Performing process monitoring
- Documenting and patching the holes in the defense architecture
Summary and Conclusion
Requirements
- A foundational understanding of information system security
Audience
- Information systems analysts
Need help picking the right course?
MITRE ATT&CK Training Course - Enquiry
Testimonials (2)
- Understanding that ATT&CK creates a map that makes it easy to see, where an organization is protected and where the vulnerable areas are. Then to identify the security gaps that are most significant from a risk perspective. - Learn that each technique comes with a list of mitigations and detections that incident response teams can employ to detect and defend. - Learn about the various sources and communities for deriving Defensive Recommendations.
CHU YAN LEE - PacificLight Power Pte Ltd
Course - MITRE ATT&CK
All is excellent
Manar Abu Talib - Dubai Electronic Security Center
Course - MITRE ATT&CK
Upcoming Courses
Related Courses
AI-Powered Cybersecurity: Threat Detection & Response
21 HoursThis instructor-led, live training in the UAE (online or onsite) is designed for beginner-level cybersecurity professionals looking to utilize AI to boost their threat detection and response capabilities.
By the end of this training, participants will be able to:
- Understand AI applications in cybersecurity.
- Implement AI algorithms for threat detection.
- Automate incident response with AI tools.
- Integrate AI into existing cybersecurity infrastructure.
AI-Powered Cybersecurity: Advanced Threat Detection & Response
28 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at intermediate-level to advanced-level cybersecurity professionals who wish to elevate their skills in AI-driven threat detection and incident response.
By the end of this training, participants will be able to:
- Implement advanced AI algorithms for real-time threat detection.
- Customize AI models for specific cybersecurity challenges.
- Develop automation workflows for threat response.
- Secure AI-driven security tools against adversarial attacks.
Blue Team Fundamentals: Security Operations and Analysis
21 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at intermediate-level IT security professionals who wish to develop skills in security monitoring, analysis, and response.
By the end of this training, participants will be able to:
- Understand the role of a Blue Team in cybersecurity operations.
- Use SIEM tools for security monitoring and log analysis.
- Detect, analyze, and respond to security incidents.
- Perform network traffic analysis and threat intelligence gathering.
- Apply best practices in security operations center (SOC) workflows.
Bug Bounty Hunting
21 HoursBug Bounty Hunting involves locating security weaknesses in software, websites, or systems and reporting them responsibly to earn rewards or recognition.
This instructor-led live training, available online or onsite, targets beginner-level security researchers, developers, and IT professionals seeking to grasp the fundamentals of ethical bug hunting and learn how to engage in bug bounty programs.
Upon completing this training, participants will be able to:
- Comprehend the core concepts behind vulnerability discovery and bug bounty programs.
- Utilize essential tools such as Burp Suite and browser developer tools for application testing.
- Recognize prevalent web security flaws, including XSS, SQLi, and CSRF.
- Submit clear and actionable vulnerability reports to bug bounty platforms.
Course Format
- Interactive lectures and discussions.
- Hands-on practice with bug bounty tools in simulated testing environments.
- Guided exercises centered on discovering, exploiting, and reporting vulnerabilities.
Course Customization Options
- To arrange customized training tailored to your organization's applications or testing requirements, please contact us.
Bug Bounty: Advanced Techniques and Automation
21 HoursBug Bounty: Advanced Techniques and Automation offers an in-depth exploration of high-impact vulnerabilities, automation frameworks, reconnaissance strategies, and the tooling methodologies employed by top-tier bug bounty hunters.
This instructor-led training, available both online and onsite, is designed for security researchers, penetration testers, and bug bounty hunters at the intermediate to advanced levels who aim to automate their workflows, scale their reconnaissance efforts, and uncover complex vulnerabilities across multiple targets.
Upon completing this training, participants will be equipped to:
- Automate reconnaissance and scanning processes across multiple targets.
- Utilize state-of-the-art tools and scripts for bounty automation.
- Identify complex, logic-based vulnerabilities that extend beyond standard scanning capabilities.
- Develop custom workflows for subdomain enumeration, fuzzing, and reporting.
Course Format
- Interactive lectures and discussions.
- Hands-on practice with advanced tools and automation scripting.
- Guided labs focusing on real-world bounty workflows and advanced attack chains.
Course Customization Options
- To arrange customized training tailored to your specific bounty targets, automation requirements, or internal security challenges, please contact us.
Cyber Defence (SOC) Analyst Foundation
7 HoursThis instructor-led, live training in the UAE (available online or onsite) is designed for security analysts and system administrators at the beginner to intermediate levels who wish to establish a foundational understanding of Cyber Defence (SOC) analysis.
By the end of this training, participants will be able to:
- Understand the principles of Security Management in a Cyber Defence context.
- Execute effective Incident Response strategies to mitigate security incidents.
- Implement Security Education practices to enhance organizational awareness and preparedness.
- Manage and analyze Security Information for proactive threat identification.
- Utilize Event Management techniques to monitor and respond to security events.
- Implement Vulnerability Management processes to identify and address system vulnerabilities.
- Develop skills in Threat Detection to identify and respond to potential cyber threats.
- Participate in Simulated Attacks to test and improve incident response capabilities.
CHFI - Certified Digital Forensics Examiner
35 HoursThe vendor-neutral Certified Digital Forensics Examiner certification is specifically designed to train Cyber Crime and Fraud Investigators, equipping students with skills in electronic discovery and advanced investigative methodologies. This course is indispensable for any professional who encounters digital evidence during the course of an investigation.
The Certified Digital Forensics Examiner training imparts the structured methodology required to conduct computer forensic examinations. Participants will learn to apply forensically sound techniques to evaluate crime scenes, collect and document pertinent information, interview relevant personnel, maintain a strict chain of custody, and draft comprehensive findings reports.
The Certified Digital Forensics Examiner program offers significant value to organizations, individuals, government entities, and law enforcement agencies seeking to pursue litigation, establish proof of guilt, or implement corrective actions based on digital evidence.
Certified Incident Handler
21 HoursThe Certified Incident Handler program delivers a systematic methodology for managing and responding to cybersecurity incidents with high efficiency and effectiveness.
This instructor-led live training, available both online and onsite, is designed for IT security professionals at the intermediate level who aim to build the tactical expertise required to plan, classify, contain, and manage security incidents.
Upon completing this training, participants will be equipped to:
- Comprehend the incident response lifecycle and its distinct phases.
- Implement procedures for incident detection, classification, and notification.
- Effectively apply strategies for containment, eradication, and recovery.
- Create post-incident reports and continuous improvement plans.
Course Format
- Interactive lectures and discussions.
- Practical application of incident handling procedures in simulated scenarios.
- Guided exercises targeting detection, containment, and response workflows.
Customization Options
- For organizations seeking training tailored to their specific incident response procedures or tools, please contact us to arrange a customized session.
Mastering Continuous Threat Exposure Management (CTEM)
28 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at intermediate-level cybersecurity professionals who wish to implement CTEM in their organizations.
By the end of this training, participants will be able to:
- Understand the principles and stages of CTEM.
- Identify and prioritize risks using CTEM methodologies.
- Integrate CTEM practices into existing security protocols.
- Utilize tools and technologies for continuous threat management.
- Develop strategies to validate and improve security measures continuously.
Cyber Emergency Response Team (CERT)
7 HoursThis course explores the effective management of an incident response team. Given the frequency and complexity of contemporary cyber threats, incident response has become a vital function for organizations. As the final line of defense, detecting and responding to incidents efficiently demands robust management processes. Leading an incident response team necessitates specialized skills and expertise.
Cyber Threat Intelligence
35 HoursThis instructor-led, live training in the UAE (online or onsite) is designed for advanced cyber security professionals who wish to understand Cyber Threat Intelligence and acquire skills to effectively manage and mitigate cyber threats.
By the end of this training, participants will be able to:
- Understand the fundamentals of Cyber Threat Intelligence (CTI).
- Analyze the current cyber threat landscape.
- Collect and process intelligence data.
- Perform advanced threat analysis.
- Leverage Threat Intelligence Platforms (TIPs) and automate threat intelligence processes.
Fundamentals of Corporate Cyber Warfare
14 HoursThis instructor-led, live training in the UAE (online or onsite) addresses various facets of enterprise security, ranging from artificial intelligence to database protection. The curriculum also encompasses the latest tools, methodologies, and strategic mindsets required to defend against attacks.
DeepSeek for Cybersecurity and Threat Detection
14 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at intermediate-level cybersecurity professionals who wish to leverage DeepSeek for advanced threat detection and automation.
By the end of this training, participants will be able to:
- Utilize DeepSeek AI for real-time threat detection and analysis.
- Implement AI-driven anomaly detection techniques.
- Automate security monitoring and response using DeepSeek.
- Integrate DeepSeek into existing cybersecurity frameworks.
Digital Investigations - Advanced
21 HoursIn this course, you will gain an in-depth understanding of the core principles and methodologies used in digital forensics, alongside a comprehensive overview of the diverse range of computer forensics tools available. You will master essential forensic procedures designed to guarantee the admissibility of evidence in court, while also exploring the critical legal and ethical considerations inherent in the field.
The curriculum covers how to conduct forensic investigations on both Unix/Linux and Windows environments across various file systems. Additionally, it addresses advanced investigative domains including wireless, network, web, database, and mobile crime investigations.
Certified Lead Ethical Hacker
35 HoursWhy should you attend?
This Certified Lead Ethical Hacker training course equips you with the essential expertise to conduct information system penetration tests by applying recognized principles, procedures, and techniques to identify potential threats within a computer network. Throughout this program, you will acquire the knowledge and skills required to manage a penetration testing project or team, as well as to plan and execute both internal and external pentests in alignment with industry standards such as the Penetration Testing Execution Standard (PTES) and the Open Source Security Testing Methodology Manual (OSSTMM). Furthermore, you will develop a comprehensive understanding of how to draft reports and propose countermeasures. Through practical exercises, you will master penetration testing techniques and acquire the skills necessary to manage a pentest team, while also enhancing your customer communication and conflict resolution abilities.
The Certified Lead Ethical Hacking training course offers a technical perspective on information security through ethical hacking, utilizing common techniques such as information gathering and vulnerability detection, both within and outside of a business network.
This training is also aligned with the NICE (The National Initiative for Cybersecurity Education) Protect and Defend framework.
Upon mastering the necessary knowledge and skills in ethical hacking, you can sit for the exam and apply for the "PECB Certified Lead Ethical Hacker" credential. Holding a PECB Lead Ethical Hacker certificate demonstrates that you have acquired the practical skills to perform and manage penetration tests according to best practices.
Who should attend?
- Individuals interested in IT Security, particularly in Ethical Hacking, who wish to learn more about the field or pursue a professional career change.
- Information security officers and professionals aiming to master ethical hacking and penetration testing techniques.
- Managers or consultants seeking to learn how to oversee the penetration testing process.
- Auditors looking to perform and conduct professional penetration tests.
- Personnel responsible for maintaining the security of information systems within an organization.
- Technical experts who want to learn how to prepare for a pentest.
- Cybersecurity professionals and members of information security teams.