Get in Touch

Course Outline

Introduction

Understanding Malware

  • Types of malware.
  • The evolution of malware.

Overview of Malware Attacks

  • Propagating attacks.
  • Non-propagating attacks.

ATT&CK Matrices

  • Enterprise ATT&CK.
  • Pre-ATT&CK.
  • Mobile ATT&CK.

MITRE ATT&CK

  • 11 distinct tactics.
  • Techniques.
  • Procedures.

Preparing the Development Environment

  • Setting up a version control center (GitHub).
  • Downloading a project that hosts a data-based to-do list system.
  • Installing and configuring ATT&CK Navigator.

Monitoring a Compromised System (WMI)

  • Implementing command-line scripts to conduct lateral attacks.
  • Using ATT&CK Navigator to identify the compromise.
  • Evaluating the compromise through the ATT&CK framework.
  • Performing process monitoring.
  • Documenting and patching vulnerabilities in the defense architecture.

Monitoring a Compromised System (EternalBlue)

  • Implementing command-line scripts to conduct a lateral attack.
  • Utilizing ATT&CK Navigator to identify the compromise.
  • Assessing the compromise through the ATT&CK framework.
  • Performing process monitoring.
  • Documenting and patching holes in the defense architecture.

Summary and Conclusion

Requirements

  • A foundational understanding of information system security.

Audience

  • Information systems analysts.
 7 Hours

Number of participants


Price per participant

Testimonials (2)

Upcoming Courses

Related Categories