MITRE ATT&CK Training Course
MITRE ATT&CK serves as a comprehensive framework for classifying attacks and evaluating organizational risk through defined tactics and techniques. By highlighting security awareness gaps, it helps identify defensive weaknesses and prioritize potential threats.
This instructor-led live training, available either online or onsite, targets information system analysts aiming to leverage MITRE ATT&CK to mitigate the risk of security breaches.
Upon completion of this training, participants will be capable of:
- Establishing the required development environment to begin implementing MITRE ATT&CK.
- Classifying the ways in which attackers interact with systems.
- Documenting adversary behaviors within system environments.
- Tracking attacks, deciphering patterns, and evaluating existing defensive tools.
Course Format
- Interactive lectures and discussions.
- Extensive exercises and practical application.
- Hands-on implementation within a live lab environment.
Course Customization Options
- To request customized training for this course, please contact us to arrange details.
Course Outline
Introduction
What is Malware?
- Types of malware.
- The evolution of malware.
Overview of Malware Attacks
- Propagating.
- Non-propagating.
Matrices of ATT&CK
- Enterprise ATT&CK.
- Pre-ATT&CK.
- Mobile ATT&CK.
MITRE ATT&CK
- 11 tactics.
- Techniques.
- Procedures.
Preparing the Development Environment
- Setting up a version control center (GitHub).
- Downloading a project that hosts a to-do list system of data.
- Installing and configuring ATT&CK Navigator.
Monitoring a Compromised System (WMI)
- Executing command-line scripts to conduct a lateral attack.
- Utilizing ATT&CK Navigator to identify the compromise.
- Assessing the compromise through the ATT&CK framework.
- Performing process monitoring.
- Documenting and patching vulnerabilities in the defense architecture.
Monitoring a Compromised System (EternalBlue)
- Executing command-line scripts to conduct a lateral attack.
- Utilizing ATT&CK Navigator to identify the compromise.
- Assessing the compromise through the ATT&CK framework.
- Performing process monitoring.
- Documenting and patching vulnerabilities in the defense architecture.
Summary and Conclusion
Requirements
- A solid understanding of information system security.
Audience
- Information systems analysts.
Open Training Courses require 5+ participants.
MITRE ATT&CK Training Course - Booking
MITRE ATT&CK Training Course - Enquiry
MITRE ATT&CK - Consultancy Enquiry
Testimonials (2)
- Understanding that ATT&CK creates a map that makes it easy to see, where an organization is protected and where the vulnerable areas are. Then to identify the security gaps that are most significant from a risk perspective. - Learn that each technique comes with a list of mitigations and detections that incident response teams can employ to detect and defend. - Learn about the various sources and communities for deriving Defensive Recommendations.
CHU YAN LEE - PacificLight Power Pte Ltd
Course - MITRE ATT&CK
All is excellent
Manar Abu Talib - Dubai Electronic Security Center
Course - MITRE ATT&CK
Upcoming Courses
Related Courses
AI-Powered Cybersecurity: Threat Detection & Response
21 HoursThis instructor-led, live training in Romania (online or on-site) is designed for beginner-level cybersecurity professionals who want to learn how to use AI to improve threat detection and response capabilities.
By the end of this training, participants will be able to:
- Understand how AI is applied in cybersecurity.
- Deploy AI algorithms for threat detection.
- Automate incident response using AI tools.
- Incorporate AI into existing cybersecurity infrastructure.
AI-Powered Cybersecurity: Advanced Threat Detection & Response
28 HoursThis instructor-led, live training in Romania (online or onsite) is aimed at intermediate-level to advanced-level cybersecurity professionals who wish to elevate their skills in AI-driven threat detection and incident response.
By the end of this training, participants will be able to:
- Implement advanced AI algorithms for real-time threat detection.
- Customize AI models for specific cybersecurity challenges.
- Develop automation workflows for threat response.
- Secure AI-driven security tools against adversarial attacks.
Blue Team Fundamentals: Security Operations and Analysis
21 HoursThis instructor-led, live training in Romania (online or onsite) is designed for intermediate-level IT security professionals who wish to develop skills in security monitoring, analysis, and response.
Upon completion of this training, participants will be able to:
- Comprehend the role of a Blue Team within cybersecurity operations.
- Utilize SIEM tools for security monitoring and log analysis.
- Identify, analyze, and respond to security incidents.
- Conduct network traffic analysis and gather threat intelligence.
- Implement best practices in Security Operations Center (SOC) workflows.
Bug Bounty Hunting
21 HoursBug Bounty Hunting involves discovering security weaknesses in software, websites, or systems and reporting them responsibly in exchange for rewards or acknowledgment.
This instructor-led live training, available online or onsite, targets beginner-level security researchers, developers, and IT professionals eager to grasp the fundamentals of ethical bug hunting and learn how to join bug bounty programs.
Upon completing this training, participants will be capable of:
- Grasping the fundamental concepts of vulnerability discovery and bug bounty programs.
- Employing essential tools such as Burp Suite and browser developer tools to test applications.
- Detecting prevalent web security flaws, including XSS, SQLi, and CSRF.
- Submitting clear, actionable vulnerability reports to bug bounty platforms.
Course Format
- Interactive lectures and discussions.
- Practical application of bug bounty tools within simulated testing environments.
- Guided exercises centered on discovering, exploiting, and reporting vulnerabilities.
Course Customization Options
- To request a customized training session tailored to your organization's applications or testing requirements, please contact us to arrange.
Bug Bounty: Advanced Techniques and Automation
21 HoursThe course "Bug Bounty: Advanced Techniques and Automation" provides an in-depth exploration of high-impact vulnerabilities, automation frameworks, reconnaissance methodologies, and the strategic tooling employed by top-tier bug bounty hunters.
This instructor-led live training, available both online and onsite, is designed for intermediate to advanced-level security researchers, penetration testers, and bug bounty hunters. Its goal is to help participants automate their workflows, scale their reconnaissance efforts, and identify complex vulnerabilities across multiple targets.
Upon completion of this training, participants will be able to:
- Automate the reconnaissance and scanning processes for multiple targets.
- Utilize state-of-the-art tools and scripts specifically designed for bounty automation.
- Identify complex, logic-based vulnerabilities that go beyond the scope of standard scans.
- Develop custom workflows for subdomain enumeration, fuzzing, and vulnerability reporting.
Course Format
- Interactive lectures and discussions.
- Practical application of advanced tools and scripting for automation.
- Guided laboratory sessions focused on real-world bounty workflows and advanced attack chains.
Course Customization Options
- For customized training tailored to your specific bounty targets, automation requirements, or internal security challenges, please contact us to arrange the details.
Cyber Defence (SOC) Analyst Foundation
7 HoursThis instructor-led, live training in Romania (online or onsite) is aimed at beginner to intermediate-level security analysts and system administrators who wish to establish a foundational understanding of Cyber Defence (SOC) analysis.
By the end of this training, participants will be able to:
- Understand the principles of Security Management in a Cyber Defence context.
- Execute effective Incident Response strategies to mitigate security incidents.
- Implement Security Education practices to enhance organizational awareness and preparedness.
- Manage and analyze Security Information for proactive threat identification.
- Utilize Event Management techniques to monitor and respond to security events.
- Implement Vulnerability Management processes to identify and address system vulnerabilities.
- Develop skills in Threat Detection to identify and respond to potential cyber threats.
- Participate in Simulated Attacks to test and improve incident response capabilities.
CHFI - Certified Digital Forensics Examiner
35 HoursThe vendor-neutral Certified Digital Forensics Examiner certification is designed to train Cyber Crime and Fraud Investigators, equipping students with skills in electronic discovery and advanced investigative techniques. This course is vital for anyone who encounters digital evidence during an investigation.
The Certified Digital Forensics Examiner training covers the methodology for conducting computer forensic examinations. Students learn to apply forensically sound investigative techniques to evaluate the scene, collect and document relevant information, interview key personnel, maintain the chain of custody, and draft findings reports.
The Certified Digital Forensics Examiner course benefits organizations, individuals, government offices, and law enforcement agencies interested in pursuing litigation, proving guilt, or taking corrective action based on digital evidence.
Certified Incident Handler
21 HoursThe Certified Incident Handler course delivers a systematic methodology for managing and responding to cybersecurity incidents with both efficiency and effectiveness.
This instructor-led training, available online or onsite, is designed for intermediate-level IT security professionals seeking to build the tactical expertise required to plan, classify, contain, and manage security incidents.
Upon completing this training, participants will be equipped to:
- Comprehend the incident response lifecycle and its distinct phases.
- Carry out procedures for incident detection, classification, and notification.
- Implement effective strategies for containment, eradication, and recovery.
- Create post-incident reports and plans for continuous improvement.
Course Format
- Interactive lectures and discussions.
- Practical application of incident handling procedures within simulated environments.
- Guided exercises centered on detection, containment, and response workflows.
Customization Options
- For a customized training session tailored to your organization’s specific incident response procedures or tools, please contact us to make arrangements.
Mastering Continuous Threat Exposure Management (CTEM)
28 HoursThis instructor-led, live training in Romania (online or onsite) is designed for intermediate-level cybersecurity professionals looking to implement CTEM within their organizations.
Upon completing this training, participants will be able to:
- Grasp the core principles and stages of CTEM.
- Identify and prioritize risks using CTEM methodologies.
- Integrate CTEM practices into existing security protocols.
- Utilize tools and technologies for continuous threat management.
- Develop strategies to validate and improve security measures continuously.
Cyber Emergency Response Team (CERT)
7 HoursThis course explores the management of an incident response team. Given the frequency and complexity of modern cyber attacks, incident response has become a critical organizational function, necessitating an understanding of how first responders operate.
As the final line of defense, detecting and effectively addressing incidents requires robust management processes. Leading an incident response team demands specialized skills and expertise.
Cyber Threat Intelligence
35 HoursThis instructor-led, live training in Romania (online or onsite) is aimed at advanced-level cyber security professionals who wish to understand Cyber Threat Intelligence and learn skills to effectively manage and mitigate cyber threats.
By the end of this training, participants will be able to:
- Understand the fundamentals of Cyber Threat Intelligence (CTI).
- Analyze the current cyber threat landscape.
- Collect and process intelligence data.
- Perform advanced threat analysis.
- Leverage Threat Intelligence Platforms (TIPs) and automate threat intelligence processes.
Fundamentals of Corporate Cyber Warfare
14 HoursThis instructor-led, live training in Romania (online or on-site) examines various dimensions of enterprise security, encompassing areas from AI to database security. It also covers the latest tools, processes, and strategic mindsets necessary to protect against attacks.
DeepSeek for Cybersecurity and Threat Detection
14 HoursThis instructor-led, live training in Romania (online or onsite) is aimed at intermediate-level cybersecurity professionals who wish to leverage DeepSeek for advanced threat detection and automation.
By the end of this training, participants will be able to:
- Utilize DeepSeek AI for real-time threat detection and analysis.
- Implement AI-driven anomaly detection techniques.
- Automate security monitoring and response using DeepSeek.
- Integrate DeepSeek into existing cybersecurity frameworks.
Ethical Hacker
35 HoursThis course immerses participants in an interactive learning environment, demonstrating how to scan, test, compromise, and secure their own systems. The lab-intensive setting provides each student with in-depth knowledge and practical experience with essential, modern security systems. Participants begin by understanding the mechanics of perimeter defenses before proceeding to scan and attack their own networks—a safe process where no actual infrastructure is compromised. Students then explore how intruders escalate privileges and identify the steps necessary to secure a system. The curriculum also covers Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, and Virus Creation. Upon completing this intensive 5-day program, students will possess a hands-on understanding and practical experience in Ethical Hacking.
The purpose of the Ethical Hacking Training is to:
- Establish and govern minimum standards for certifying professional information security specialists in ethical hacking methodologies.
- Assure the public that credentialed individuals meet or exceed these minimum standards.
- Reinforce ethical hacking as a unique, self-regulating profession.
Target Audience:
This course is ideal for professionals in roles such as, but not limited to:
- Security Engineers
- Security Consultants
- Security Managers
- IT Directors and Managers
- Security Auditors
- IT Systems Administrators
- IT Network Administrators
- Network Architects
- Developers
MasterClass Certified Ethical Hacker Program
28 HoursThe Certified Ethical Hacker certification is a highly coveted cybersecurity credential on a global scale.
This program blends instruction with practical application to prepare students for both the CEH certification exam and the CEH Practical Exam. Candidates who successfully pass both examinations earn the CEH Master credential alongside their standard CEH certification.
Students can opt to include either the CPENT or the CHFI course within their package.
Each student will receive training for either the Certified Penetration Testing Professional (CPENT) course or the Computer Hacking Forensic Investigator (CHFI) course through EC-Council’s online, self-paced streaming video platform.
CPENT (Pen-test):
Instructs students on applying the concepts and tools learned in the CEH program to a penetration testing methodology within a live cyber range.
CHFI (Computer Forensics):
Teaches students a methodical approach to computer forensics, covering searching and seizing, chain-of-custody procedures, acquisition, preservation, analysis, and reporting of digital evidence.
Course Description
CEH offers an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It teaches you how hackers think and operate maliciously, enabling you to better design your security infrastructure and defend against future threats. Understanding system weaknesses and vulnerabilities allows organizations to strengthen their security controls and minimize the risk of incidents.
CEH is designed to integrate a hands-on environment and systematic process across each ethical hacking domain and methodology, providing the opportunity to demonstrate the knowledge and skills required to achieve the CEH credential. You will adopt a completely different perspective on the responsibilities and measures necessary for security.
Who Should Attend
- Law enforcement personnel
- System administrators
- Security officers
- Defense and military personnel
- Legal professionals
- Bankers
- Security professionals
About the Certified Ethical Hacker Master
To earn the CEH Master certification, you must pass the CEH Practical exam. This exam is designed to allow students to prove they can execute the principles taught in the CEH course. It requires demonstrating the application of ethical hacking techniques such as threat vector identification, network scanning, OS detection, vulnerability analysis, system hacking, and more.
The CEH Practical exam does not use simulations. Instead, you will challenge a live range designed to mimic a corporate network using live virtual machines, networks, and applications.
Successfully completing the challenges in the CEH Practical Exam is the next step after attaining the Certified Ethical Hacker (CEH) certification. Passing both the CEH exam and the CEH Practical Exam earns you the additional CEH Master certification.
About the Certified Ethical Hacker Practical
To prove your proficiency in ethical hacking, we test your abilities with real-world challenges in a realistic environment. You will use labs and tools to complete specific ethical hacking challenges within a set time limit, mirroring real-world scenarios.
The EC-Council CEH (Practical) exam involves a complex network replicating a large organization’s real-life network, consisting of various network systems (including DMZ, Firewalls, etc.). You must apply your ethical hacking skills to discover and exploit real-time vulnerabilities while auditing the systems.
About CPENT
EC-Council’s Certified Penetration Tester (CPENT) program focuses entirely on penetration testing. It teaches you to perform attacks, exploit, evade, and defend within an enterprise network environment. If you have only worked with flat networks, CPENT’s live practice range will elevate your skills by teaching you to pen test IoT and OT systems, write your own exploits, build custom tools, conduct advanced binary exploitation, perform double pivots to access hidden networks, and customize scripts and exploits to infiltrate the innermost segments of a network.
About CHFI
The Computer Hacking Forensic Investigator (CHFI) course delivers the security discipline of digital forensics from a vendor-neutral perspective. It is a comprehensive course covering major forensic investigation scenarios and enabling students to gain necessary hands-on experience with various forensic investigation techniques and standard forensic tools required to successfully conduct computer forensic investigations.