MITRE ATT&CK Training Course
MITRE ATT&CK is a comprehensive framework of tactics and techniques designed to classify cyberattacks and evaluate an organization's risk posture. It enhances security awareness by identifying defense gaps and helping to prioritize potential risks.
This instructor-led, live training (available online or onsite) is designed for information system analysts looking to leverage MITRE ATT&CK to reduce the likelihood of a security breach.
Upon completion of this training, participants will be able to:
- Establish the required development environment to begin implementing MITRE ATT&CK.
- Categorize how attackers interact with systems.
- Document adversary behaviors within systems.
- Monitor attacks, identify patterns, and evaluate existing defense tools.
Format of the Course
- Interactive lecture and discussion.
- Extensive exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
Course Outline
Introduction
What is Malware?
- Types of malware
- The evolution of malware
Overview of Malware Attacks
- Propagating
- Non-propagating
Matrices of ATT&CK
- Enterprise ATT&CK
- Pre-ATT&CK
- Mobile ATT&CK
MITRE ATT&CK
- 11 tactics
- Techniques
- Procedures
Preparing the Development Environment
- Setting up a version control center (GitHub)
- Downloading a project that hosts a to-do list system of data
- Installing and configuring ATT&CK Navigator
Monitoring a compromised system (WMI)
- Instating command line scripts to conduct a lateral attack
- Utilizing ATT&CK Navigator to identify the compromise
- Assesing the compromise through the ATT&CK framework
- Performing process monitoring
- Documenting and patching the holes in the defense architecture
Monitoring a compromised system (EternalBlue)
- Instating command line scripts to conduct a lateral attack
- Utilizing ATT&CK Navigator to identify the compromise
- Assesing the compromise through the ATT&CK framework
- Performing process monitoring
- Documenting and patching the holes in the defense architecture
Summary and Conclusion
Requirements
- An understanding of information system security
Audience
- Information systems analysts
Open Training Courses require 5+ participants.
MITRE ATT&CK Training Course - Booking
MITRE ATT&CK Training Course - Enquiry
MITRE ATT&CK - Consultancy Enquiry
Testimonials (2)
- Understanding that ATT&CK creates a map that makes it easy to see, where an organization is protected and where the vulnerable areas are. Then to identify the security gaps that are most significant from a risk perspective. - Learn that each technique comes with a list of mitigations and detections that incident response teams can employ to detect and defend. - Learn about the various sources and communities for deriving Defensive Recommendations.
CHU YAN LEE - PacificLight Power Pte Ltd
Course - MITRE ATT&CK
All is excellent
Manar Abu Talib - Dubai Electronic Security Center
Course - MITRE ATT&CK
Upcoming Courses
Related Courses
AI-Powered Cybersecurity: Threat Detection & Response
21 HoursThis instructor-led, live training in Bulgaria (online or onsite) is designed for beginner-level cybersecurity professionals eager to learn how to utilize AI for enhanced threat detection and response capabilities.
Upon completion of this training, participants will be able to:
- Grasp AI applications within cybersecurity.
- Deploy AI algorithms for threat identification.
- Automate incident response using AI tools.
- Incorporate AI into current cybersecurity infrastructure.
AI-Powered Cybersecurity: Advanced Threat Detection & Response
28 HoursThis instructor-led, live training in Bulgaria (online or onsite) is aimed at intermediate-level to advanced-level cybersecurity professionals who wish to elevate their skills in AI-driven threat detection and incident response.
By the end of this training, participants will be able to:
- Implement advanced AI algorithms for real-time threat detection.
- Customize AI models for specific cybersecurity challenges.
- Develop automation workflows for threat response.
- Secure AI-driven security tools against adversarial attacks.
Blue Team Fundamentals: Security Operations and Analysis
21 HoursThis instructor-led, live training in Bulgaria (online or on-site) is designed for IT security professionals at an intermediate level who wish to develop skills in security monitoring, analysis, and response.
Upon completion of this training, participants will be able to:
- Comprehend the role of the Blue Team within cybersecurity operations.
- Utilize SIEM tools for security monitoring and log analysis.
- Identify, analyze, and respond to security incidents.
- Conduct network traffic analysis and gather threat intelligence.
- Implement best practices in Security Operations Center (SOC) workflows.
Bug Bounty Hunting
21 HoursBug Bounty Hunting involves identifying security weaknesses in software, websites, or systems and responsibly reporting them to receive rewards or recognition.
This instructor-led, live training (available online or onsite) is designed for beginner-level security researchers, developers, and IT professionals who wish to learn the fundamentals of ethical bug hunting and how to participate in bug bounty programs.
By the end of this training, participants will be able to:
- Understand the core concepts of vulnerability discovery and bug bounty programs.
- Use key tools like Burp Suite and browser dev tools for testing applications.
- Identify common web security flaws such as XSS, SQLi, and CSRF.
- Submit clear, actionable vulnerability reports to bug bounty platforms.
Format of the Course
- Interactive lecture and discussion.
- Hands-on use of bug bounty tools in simulated testing environments.
- Guided exercises focused on discovering, exploiting, and reporting vulnerabilities.
Course Customization Options
- To request a customized training for this course based on your organization's applications or testing needs, please contact us to arrange.
Bug Bounty: Advanced Techniques and Automation
21 HoursBug Bounty: Advanced Techniques and Automation offers an in-depth exploration of high-impact vulnerabilities, automation frameworks, reconnaissance methodologies, and the strategic tooling employed by elite bug bounty hunters.
This instructor-led live training, available both online and onsite, targets intermediate to advanced security researchers, penetration testers, and bug bounty hunters who aim to automate their workflows, scale reconnaissance efforts, and uncover complex vulnerabilities across diverse targets.
Upon completing this training, participants will be capable of:
- Automating reconnaissance and scanning processes for multiple targets.
- Utilizing state-of-the-art tools and scripts essential for bounty automation.
- Identifying complex, logic-based vulnerabilities that go beyond standard scanning capabilities.
- Developing custom workflows for subdomain enumeration, fuzzing, and report generation.
Course Format
- Interactive lectures and discussions.
- Practical application of advanced tools and scripting techniques for automation.
- Guided labs focusing on real-world bounty workflows and sophisticated attack chains.
Customization Options
- For tailored training based on specific bounty targets, automation requirements, or internal security challenges, please contact us to arrange a customized session.
Cyber Defence (SOC) Analyst Foundation
7 HoursThis instructor-led live training in Bulgaria (online or on-site) is intended for beginner to intermediate-level security analysts and system administrators aiming to establish a foundational understanding of Cyber Defence (SOC) analysis.
By the conclusion of this training, participants will be able to:
- Understand the principles of Security Management in a Cyber Defence context.
- Execute effective Incident Response strategies to mitigate security incidents.
- Implement Security Education practices to enhance organizational awareness and preparedness.
- Manage and analyze Security Information for proactive threat identification.
- Utilize Event Management techniques to monitor and respond to security events.
- Implement Vulnerability Management processes to identify and address system vulnerabilities.
- Develop skills in Threat Detection to identify and respond to potential cyber threats.
- Participate in Simulated Attacks to test and improve incident response capabilities.
CHFI - Certified Digital Forensics Examiner
35 HoursThe vendor-neutral Certified Digital Forensics Examiner certification is designed to equip Cyber Crime and Fraud Investigators with skills in electronic discovery and advanced investigative methodologies. This course is indispensable for professionals who encounter digital evidence during their investigative work.
Training for the Certified Digital Forensics Examiner covers the systematic approach to conducting computer forensic examinations. Students will master forensically sound techniques to evaluate crime scenes, collect and document pertinent data, interview relevant personnel, preserve the chain of custody, and compile comprehensive findings reports.
The Certified Digital Forensics Examiner course offers significant value to organizations, individuals, government entities, and law enforcement agencies seeking to pursue litigation, establish proof of guilt, or implement corrective actions grounded in digital evidence.
Certified Incident Handler
21 HoursThe Certified Incident Handler program offers a systematic methodology for effectively and efficiently managing and responding to cybersecurity incidents.
Delivered by an instructor via live online or onsite sessions, this training targets intermediate IT security professionals seeking to build the tactical expertise required to plan, categorize, contain, and oversee security incidents.
Upon completion, participants will be equipped to:
- Comprehend the incident response lifecycle and its distinct phases.
- Implement procedures for incident detection, classification, and notification.
- Effectively apply strategies for containment, eradication, and recovery.
- Create post-incident reports and continuous improvement initiatives.
Course Format
- Engaging lectures and interactive discussions.
- Practical application of incident handling procedures in simulated environments.
- Facilitated exercises concentrating on detection, containment, and response workflows.
Customization Options
- For tailored training aligned with your organization’s specific incident response protocols or tools, please contact us to make arrangements.
Mastering Continuous Threat Exposure Management (CTEM)
28 HoursThis instructor-led, live training in Bulgaria (online or onsite) is designed for intermediate-level cybersecurity professionals looking to implement CTEM within their organizations.
By the conclusion of this training, participants will be equipped to:
- Grasp the core principles and stages of CTEM.
- Identify and prioritize risks using established CTEM methodologies.
- Seamlessly integrate CTEM practices into current security protocols.
- Leverage tools and technologies for ongoing threat management.
- Develop strategies to continuously validate and enhance security measures.
Cyber Emergency Response Team (CERT)
7 HoursThis course provides an in-depth look at managing an incident response team. Given the increasing frequency and complexity of modern cyber attacks, incident response has become a vital function for organizations. First responders play a crucial role in mitigating risks.
As the final line of defense, effective incident response relies on detecting and addressing incidents efficiently through robust management processes. Leading an incident response team demands specialized skills and comprehensive knowledge.
Cyber Threat Intelligence
35 HoursThis instructor-led, live training in Bulgaria (online or onsite) is designed for advanced cyber security professionals who wish to understand Cyber Threat Intelligence and develop skills to effectively manage and mitigate cyber threats.
By the end of this training, participants will be able to:
- Understand the fundamentals of Cyber Threat Intelligence (CTI).
- Analyze the current cyber threat landscape.
- Collect and process intelligence data.
- Perform advanced threat analysis.
- Leverage Threat Intelligence Platforms (TIPs) and automate threat intelligence processes.
Fundamentals of Corporate Cyber Warfare
14 HoursThis instructor-led, live training in Bulgaria (online or onsite) covers various aspects of enterprise security, from AI to database security. It also includes the latest tools, processes, and mindset needed to protect against attacks.
DeepSeek for Cybersecurity and Threat Detection
14 HoursThis instructor-led, live training in Bulgaria (online or onsite) is aimed at intermediate-level cybersecurity professionals who wish to leverage DeepSeek for advanced threat detection and automation.
By the end of this training, participants will be able to:
- Utilize DeepSeek AI for real-time threat detection and analysis.
- Implement AI-driven anomaly detection techniques.
- Automate security monitoring and response using DeepSeek.
- Integrate DeepSeek into existing cybersecurity frameworks.
Ethical Hacker
35 HoursThis course immerses students in an interactive learning environment where they learn how to scan, test, hack, and secure their own systems. The lab-intensive setting provides each student with in-depth knowledge and practical experience with essential current security systems. Students start by understanding how perimeter defenses function, then progress to scanning and attacking their own networks—ensuring no real network is harmed. They also learn how intruders escalate privileges and what measures can be taken to secure a system. Additional topics include Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, and Virus Creation. Upon completion of this intensive 5-day course, students will possess hands-on understanding and experience in Ethical Hacking.
The purpose of the Ethical Hacking Training is to:
- Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures.
- Inform the public that credentialed individuals meet or exceed these minimum standards.
- Reinforce ethical hacking as a unique and self-regulating profession.
Audience:
The course is ideal for professionals working in positions such as, but not limited to:
- Security Engineers
- Security Consultants
- Security Managers
- IT Director/Managers
- Security Auditors
- IT Systems Administrators
- IT Network Administrators
- Network Architects
- Developers
MasterClass Certified Ethical Hacker Program
28 HoursThe Certified Ethical Hacker certification is a globally recognized cybersecurity credential.
This comprehensive program combines theoretical instruction with practical exercises to prepare students for both the CEH certification exam and the CEH Practical Exam. Candidates who successfully pass both examinations earn the CEH Master credential alongside their CEH certification.
Participants have the option to enhance their package by including either the CPENT or the CHFI course.
Training for either the Certified Penetration Testing Professional (CPENT) course or the Computer Hacking Forensic Investigator (CHFI) course is delivered to each student through EC-Council’s online, self-paced, streaming video platform.
CPENT (Pen-test):
Instructs students on applying the concepts and tools from the CEH program within a penetration testing methodology in a live cyber range environment.
CHFI (Computer Forensics):
Teaches students a structured approach to computer forensics, covering search and seizure, chain-of-custody procedures, data acquisition, preservation, analysis, and reporting of digital evidence.
Course Description
The CEH program offers a deep understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It reveals how hackers think and operate maliciously, enabling you to better configure your security infrastructure and defend against future attacks. By understanding system weaknesses and vulnerabilities, organizations can strengthen their security controls to minimize incident risks.
Designed to incorporate a hands-on environment and systematic process across every ethical hacking domain and methodology, CEH provides the opportunity to demonstrate the knowledge and skills required to achieve the CEH credential. You will be exposed to a completely different perspective on the responsibilities and measures necessary for maintaining security.
Who Should Attend
- Law enforcement personnel
- System administrators
- Security officers
- Defense and military personnel
- Legal professionals
- Bankers
- Security professionals
About the Certified Ethical Hacker Master
To earn the CEH Master certification, you must pass the CEH Practical exam. This exam is designed to allow students to prove they can execute the principles taught in the CEH course. It requires demonstrating the application of ethical hacking techniques such as threat vector identification, network scanning, OS detection, vulnerability analysis, system hacking, and more.
The CEH Practical exam does not rely on simulations. Instead, you will tackle challenges in a live range designed to mimic a corporate network using live virtual machines, networks, and applications.
Successfully completing the challenges in the CEH Practical Exam is the next step after obtaining the Certified Ethical Hacker (CEH) certification. Passing both the CEH exam and the CEH Practical Exam earns you the additional CEH Master certification.
About the Certified Ethical Hacker Practical
To prove your ethical hacking skills, we test your abilities against real-world challenges in a real-world environment. Using labs and tools, you must complete specific ethical hacking challenges within a time limit, mirroring the pressures of actual scenarios.
The EC-Council CEH (Practical) exam involves a complex network that replicates a large organization’s real-life infrastructure, including various network systems (such as DMZ, Firewalls, etc.). You must apply your ethical hacking skills to discover and exploit real-time vulnerabilities while simultaneously auditing the systems.
About CPENT
EC-Council’s Certified Penetration Tester (CPENT) program focuses on penetration testing, teaching you to perform in enterprise network environments that must be attacked, exploited, evaded, and defended. If you have only worked in flat networks, CPENT’s live practice range will elevate your skills by teaching you to penetration test IoT and OT systems, write your own exploits, build custom tools, conduct advanced binary exploitation, perform double pivots to access hidden networks, and customize scripts and exploits to infiltrate the innermost segments of a network.
About CHFI
The Computer Hacking Forensic Investigator (CHFI) course delivers the security discipline of digital forensics from a vendor-neutral perspective. It is a comprehensive course covering major forensic investigation scenarios, enabling students to acquire necessary hands-on experience with various forensic investigation techniques and standard forensic tools required to successfully conduct computer forensic investigations.