Get in Touch

Course Outline

Introduction

What is Malware?

  • Types of malware.
  • The evolution of malware.

Overview of Malware Attacks

  • Propagating.
  • Non-propagating.

Matrices of ATT&CK

  • Enterprise ATT&CK.
  • Pre-ATT&CK.
  • Mobile ATT&CK.

MITRE ATT&CK

  • 11 tactics.
  • Techniques.
  • Procedures.

Preparing the Development Environment

  • Setting up a version control center (GitHub).
  • Downloading a project that hosts a to-do list system of data.
  • Installing and configuring ATT&CK Navigator.

Monitoring a Compromised System (WMI)

  • Executing command-line scripts to conduct a lateral attack.
  • Utilizing ATT&CK Navigator to identify the compromise.
  • Assessing the compromise through the ATT&CK framework.
  • Performing process monitoring.
  • Documenting and patching vulnerabilities in the defense architecture.

Monitoring a Compromised System (EternalBlue)

  • Executing command-line scripts to conduct a lateral attack.
  • Utilizing ATT&CK Navigator to identify the compromise.
  • Assessing the compromise through the ATT&CK framework.
  • Performing process monitoring.
  • Documenting and patching vulnerabilities in the defense architecture.

Summary and Conclusion

Requirements

  • A solid understanding of information system security.

Audience

  • Information systems analysts.
 7 Hours

Number of participants


Price per participant

Testimonials (2)

Upcoming Courses

Related Categories