Free
MITRE ATT&CK Defender™ ATT&CK® Adversary Emulation
Do you want to learn the exciting discipline of Adversary Emulation? In this MITRE ATT&CK® Defender™ (MAD) Adversary Emulation course, you’ll learn how to emulate real-world adversary threats to improve cybersecurity. Leveraging the MITRE ATT&CK Framework, you will research, plan, and execute adversary emulation activities in hands-on labs.

8
H
6
M
Time
intermediate
difficulty
9
ceu/cpe
Course Content
Identifying Detections and Mitigations (Lab 4.4 Walkthrough)
Implementing Adversary TTPs
Identifying Detections and Mitigations (Lab 4.4 Overview)
Implementing Adversary TTPs
Automating Adversary TTPs (Lab 4.3 Walkthrough)
Implementing Adversary TTPs
Automating Adversary TTPs (Lab 4.3 Overview)
Implementing Adversary TTPs
Implementing Adversary TTPs (Lab 4.2 Walkthrough)
Implementing Adversary TTPs
Implementing Adversary TTPs (Lab 4.2 Overview)
Implementing Adversary TTPs
Planning TTP Implementations (Lab 4.1 Walkthrough)
Implementing Adversary TTPs
Planning TTP Implementations (Lab 4.1 Overview)
Implementing Adversary TTPs
TTP Implementation Process
Implementing Adversary TTPs
Implementing TTPs Overview
Implementing Adversary TTPs
Defining Scope, Rules of Engagement, and Approving Authorities
Adversary Emulation Planning
Planning Overview
Adversary Emulation Planning
Addressing Intelligence Gaps
Researching Adversary TTPs
Constructing the TTP Outline
Researching Adversary TTPs
Selecting the Emulated TTPs
Researching Adversary TTPs
Selecting the Emulated Threat
Researching Adversary TTPs
Researching Adversary TTPs
Researching Adversary TTPs
Adversary Emulation - Welcome to Module 2
Researching Adversary TTPs
Executing the FIN6 Adversary Emulation Plan (Lab 1.3)
Adversary Emulation Fundamentals
Optional Lab: Setting up Your Own Lab Environment
Adversary Emulation Fundamentals
Lab: Touring the CTID Adversary Emulation Library
Adversary Emulation Fundamentals
Introducing the Adversary Emulation Plan
Adversary Emulation Fundamentals
Defining Engagement Objectives
Adversary Emulation Fundamentals
Adversary Emulation Framework
Adversary Emulation Fundamentals
Adversary Emulation Overview
Adversary Emulation Fundamentals
Course Description