MITRE ATT&CK Training Course
MITRE ATT&CK is a framework of tactics and techniques used to classify attacks and assesses an organization's risk. ATT&CK brings awareness to an organization's security, identifying holes in defenses and prioritizing risks.
This instructor-led, live training (online or onsite) is aimed at information system analysts who wish to use MITRE ATT&CK to decrease the risk of a security compromise.
By the end of this training, participants will be able to:
- Set up the necessary development environment to start implementing MITRE ATT&CK.
- Classify how attackers interact with systems.
- Document adversary behaviors within systems.
- Track attacks, decipher patterns, and rate defense tools already in place.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
Course Outline
Introduction
What is Malware?
- Types of malware
- The evolution of malware
Overview of Malware Attacks
- Propagating
- Non-propagating
Matrices of ATT&CK
- Enterprise ATT&CK
- Pre-ATT&CK
- Mobile ATT&CK
MITRE ATT&CK
- 11 tactics
- Techniques
- Procedures
Preparing the Development Environment
- Setting up a version control center (GitHub)
- Downloading a project that hosts a to-do list system of data
- Installing and configuring ATT&CK Navigator
Monitoring a compromised system (WMI)
- Instating command line scripts to conduct a lateral attack
- Utilizing ATT&CK Navigator to identify the compromise
- Assesing the compromise through the ATT&CK framework
- Performing process monitoring
- Documenting and patching the holes in the defense architecture
Monitoring a compromised system (EternalBlue)
- Instating command line scripts to conduct a lateral attack
- Utilizing ATT&CK Navigator to identify the compromise
- Assesing the compromise through the ATT&CK framework
- Performing process monitoring
- Documenting and patching the holes in the defense architecture
Summary and Conclusion
Requirements
- An understanding of information system security
Audience
- Information systems analysts
Custom Corporate Training
Training solutions designed exclusively for businesses.
- Customized Content: We adapt the syllabus and practical exercises to the real goals and needs of your project.
- Flexible Schedule: Dates and times adapted to your team's agenda.
- Format: Online (live), In-company (at your offices), or Hybrid.
Price per private group, online live training, starting from 1300 € + VAT*
Contact us for an exact quote and to hear our latest promotions
(*The final price may vary depending on the technical specialization of the course, the level of customization, the method of delivery and the number of learners)
Need help picking the right course?
MITRE ATT&CK Training Course - Enquiry
MITRE ATT&CK - Consultancy Enquiry
Testimonials (2)
- Understanding that ATT&CK creates a map that makes it easy to see, where an organization is protected and where the vulnerable areas are. Then to identify the security gaps that are most significant from a risk perspective. - Learn that each technique comes with a list of mitigations and detections that incident response teams can employ to detect and defend. - Learn about the various sources and communities for deriving Defensive Recommendations.
CHU YAN LEE - PacificLight Power Pte Ltd
Course - MITRE ATT&CK
All is excellent
Manar Abu Talib - Dubai Electronic Security Center
Course - MITRE ATT&CK
Provisional Upcoming Courses (Contact Us For More Information)
Related Courses
AI-Powered Cybersecurity: Threat Detection & Response
21 HoursThis instructor-led, live training in Portugal (online or onsite) is designed for beginner-level cybersecurity professionals seeking to harness AI to enhance their threat detection and response capabilities.
Upon completion of this training, participants will be able to:
- Comprehend the role of AI in cybersecurity.
- Deploy AI algorithms for effective threat detection.
- Automate incident response processes using AI tools.
- Integrate AI solutions into current cybersecurity infrastructure.
AI-Powered Cybersecurity: Advanced Threat Detection & Response
28 HoursThis instructor-led, live training in Portugal (online or onsite) is designed for intermediate to advanced cybersecurity professionals aiming to enhance their skills in AI-driven threat detection and incident response.
By the end of this training, participants will be able to:
- Implement advanced AI algorithms for real-time threat detection.
- Customize AI models to address specific cybersecurity challenges.
- Develop automation workflows for threat response.
- Secure AI-driven security tools against adversarial attacks.
Blue Team Fundamentals: Security Operations and Analysis
21 HoursThis instructor-led, live training in Portugal (online or onsite) targets intermediate-level IT security professionals aiming to develop competencies in security monitoring, analysis, and response.
By the end of this training, participants will be able to:
- Understand the role of a Blue Team in cybersecurity operations.
- Use SIEM tools for security monitoring and log analysis.
- Detect, analyze, and respond to security incidents.
- Perform network traffic analysis and threat intelligence gathering.
- Apply best practices in security operations center (SOC) workflows.
Bug Bounty Hunting
21 HoursBug Bounty Hunting involves the identification of security vulnerabilities within software, websites, or systems, followed by their responsible disclosure in exchange for rewards or recognition.
This instructor-led, live training (available online or onsite) is designed for beginner-level security researchers, developers, and IT professionals who wish to learn the fundamentals of ethical bug hunting and how to participate in bug bounty programs.
By the end of this training, participants will be able to:
- Understand the core concepts of vulnerability discovery and bug bounty programs.
- Use key tools like Burp Suite and browser dev tools for testing applications.
- Identify common web security flaws such as XSS, SQLi, and CSRF.
- Submit clear, actionable vulnerability reports to bug bounty platforms.
Format of the Course
- Interactive lecture and discussion.
- Hands-on use of bug bounty tools in simulated testing environments.
- Guided exercises focused on discovering, exploiting, and reporting vulnerabilities.
Course Customization Options
- To request a customized training for this course based on your organization's applications or testing needs, please contact us to arrange.
Bug Bounty: Advanced Techniques and Automation
21 HoursBug Bounty: Advanced Techniques and Automation delves into high-impact vulnerabilities, automation frameworks, reconnaissance techniques, and the tooling strategies employed by elite bug bounty hunters.
This instructor-led, live training (available online or onsite) is designed for intermediate to advanced security researchers, penetration testers, and bug bounty hunters aiming to automate their workflows, scale their reconnaissance efforts, and uncover complex vulnerabilities across multiple targets.
Upon completion of this training, participants will be able to:
- Automate reconnaissance and scanning processes for multiple targets.
- Leverage cutting-edge tools and scripts used in bounty automation.
- Identify complex, logic-based vulnerabilities that go beyond standard scans.
- Construct custom workflows for subdomain enumeration, fuzzing, and reporting.
Course Format
- Interactive lectures and discussions.
- Hands-on application of advanced tools and scripting for automation.
- Guided labs focused on real-world bounty workflows and advanced attack chains.
Course Customization Options
- To request customized training for this course based on your bounty targets, automation requirements, or internal security challenges, please contact us to arrange.
Cyber Defence (SOC) Analyst Foundation
7 HoursThis instructor-led, live training session, offered Portugal (either online or onsite), targets beginner to intermediate-level security analysts and system administrators who aim to establish a fundamental understanding of Cyber Defence (SOC) analysis.
By the conclusion of this training, participants will be able to:
- Understand the principles of Security Management in a Cyber Defence context.
- Execute effective Incident Response strategies to mitigate security incidents.
- Implement Security Education practices to enhance organizational awareness and preparedness.
- Manage and analyze Security Information for proactive threat identification.
- Utilize Event Management techniques to monitor and respond to security events.
- Implement Vulnerability Management processes to identify and address system vulnerabilities.
- Develop skills in Threat Detection to identify and respond to potential cyber threats.
- Participate in Simulated Attacks to test and improve incident response capabilities.
CHFI - Certified Digital Forensics Examiner
35 HoursThe vendor-neutral Certified Digital Forensics Examiner certification is designed to equip Cyber Crime and Fraud Investigators with skills in electronic discovery and advanced investigation techniques. This course is indispensable for professionals who need to handle digital evidence during investigative processes.
The Certified Digital Forensics Examiner training covers the methodology for performing computer forensic examinations. Participants will learn to apply forensically sound techniques to assess the scene, collect and document relevant information, interview key personnel, maintain the chain of custody, and draft comprehensive findings reports.
The Certified Digital Forensics Examiner course offers significant value to organizations, individuals, government bodies, and law enforcement agencies seeking to pursue litigation, establish proof of guilt, or implement corrective measures based on digital evidence.
Certified Incident Handler
21 HoursThe Certified Incident Handler course delivers a structured methodology for effectively and efficiently managing and responding to cybersecurity incidents.
Designed as an instructor-led live training session (available online or onsite), this programme targets intermediate-level IT security professionals seeking to acquire the tactical skills and knowledge required to plan, classify, contain, and manage security incidents.
Upon completion of this training, participants will be able to:
- Comprehend the incident response lifecycle and its distinct phases.
- Carry out incident detection, classification, and notification procedures.
- Effectively apply containment, eradication, and recovery strategies.
- Develop post-incident reports and continuous improvement plans.
Course Format
- Interactive lectures and discussions.
- Practical application of incident handling procedures within simulated scenarios.
- Guided exercises focused on detection, containment, and response workflows.
Customization Options
- To arrange customized training tailored to your organization's specific incident response procedures or tools, please contact us.
Mastering Continuous Threat Exposure Management (CTEM)
28 HoursThis instructor-led, live training in Portugal (online or onsite) is designed for intermediate-level cybersecurity professionals aiming to implement CTEM within their organizations.
Upon completion of this training, participants will be able to:
- Grasp the core principles and stages of CTEM.
- Identify and prioritize risks using CTEM methodologies.
- Integrate CTEM practices into existing security protocols.
- Leverage tools and technologies for continuous threat management.
- Develop strategies to validate and enhance security measures on an ongoing basis.
Cyber Emergency Response Team (CERT)
7 HoursThis course explores the management of an incident response team. Considering the frequency and complexity of modern cyber attacks, incident response has become a critical function for organizations.
As the final line of defense, effective incident response relies on strong management processes to detect and respond efficiently. Managing such a team demands specialized skills and knowledge.
Cyber Threat Intelligence
35 HoursThis instructor-led, live training in Portugal (online or onsite) is designed for advanced cyber security professionals aiming to understand Cyber Threat Intelligence and develop the skills to effectively manage and mitigate cyber threats.
Upon completion of this training, participants will be able to:
- Comprehend the fundamental concepts of Cyber Threat Intelligence (CTI).
- Evaluate the contemporary cyber threat landscape.
- Gather and process intelligence data.
- Conduct advanced threat analysis.
- Utilize Threat Intelligence Platforms (TIPs) to automate threat intelligence workflows.
Fundamentals of Corporate Cyber Warfare
14 HoursThis instructor-led, live training in Portugal (available online or on-site) covers various aspects of enterprise security, spanning from AI to database security. It also includes the latest tools, processes, and mindsets required to protect against attacks.
Ethical Hacker
35 HoursThis course immerses participants in an interactive environment where they learn to scan, test, hack, and secure their own systems. The lab-intensive setting provides each student with in-depth knowledge and practical experience using essential, modern security tools. Students start by understanding how perimeter defenses function before moving on to scan and attack their own networks—all in a safe, controlled manner with no real networks affected. They then explore how intruders escalate privileges and discover the steps necessary to secure a system. Additional topics include Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, and Virus Creation. Upon completing this intensive five-day class, students will possess hands-on understanding and experience in Ethical Hacking.
The purpose of the Ethical Hacking Training is to:
- Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures.
- Inform the public that credentialed individuals meet or exceed the minimum standards.
- Reinforce ethical hacking as a unique and self-regulating profession.
Audience:
This course is ideal for professionals working in roles such as, but not limited to:
- Security Engineers
- Security Consultants
- Security Managers
- IT Directors/Managers
- Security Auditors
- IT Systems Administrators
- IT Network Administrators
- Network Architects
- Developers
Certified Lead Ethical Hacker
35 HoursWhy should you attend?
The Certified Lead Ethical Hacker training course equips you with the essential expertise to conduct information system penetration tests by applying recognized principles, procedures, and penetration testing techniques. This enables you to identify potential threats within computer networks. During this course, you will acquire the knowledge and skills required to manage a penetration testing project or team, as well as plan and execute internal and external pentests in compliance with standards such as the Penetration Testing Execution Standard (PTES) and the Open Source Security Testing Methodology Manual (OSSTMM). Additionally, you will gain a comprehensive understanding of how to draft reports and propose countermeasures. Through practical exercises, you will master penetration testing techniques and develop the skills necessary to lead a pentest team, manage customer communication, and resolve conflicts.
The Certified Lead Ethical Hacking training course offers a technical perspective on information security through ethical hacking, utilizing common techniques such as information gathering and vulnerability detection, both within and outside a business network.
The training is also aligned with the NICE (The National Initiative for Cybersecurity Education) Protect and Defend framework.
After mastering the necessary knowledge and skills in ethical hacking, you may take the exam and apply for the "PECB Certified Lead Ethical Hacker" credential. Holding a PECB Lead Ethical Hacker certificate allows you to demonstrate that you have acquired the practical skills to perform and manage penetration tests according to best practices.
Who should attend?
- Individuals interested in IT Security, particularly ethical hacking, who wish to learn more about the topic or begin a professional career change.
- Information security officers and professionals seeking to master ethical hacking and penetration testing techniques.
- Managers or consultants wishing to learn how to oversee the penetration testing process.
- Auditors wishing to perform and conduct professional penetration tests.
- Persons responsible for maintaining the security of information systems within an organization.
- Technical experts who want to learn how to prepare for a pentest.
- Cybersecurity professionals and information security team members.
MasterClass Certified Ethical Hacker Program
28 HoursThe Certified Ethical Hacker qualification is a highly regarded cybersecurity credential globally.
This programme combines instruction and practical exercises to prepare students for both the CEH certification exam and the CEH Practical Exam. Candidates who successfully pass both examinations will receive the CEH credential alongside the prestigious CEH Master distinction.
Participants have the option to include either the CPENT or the CHFI course within their package.
Training for either the Certified Penetration Testing Professional (CPENT) or the Computer Hacking Forensic Investigator (CHFI) courses is delivered to each student through EC-Council’s online, self-paced, streaming video platform.
CPENT (Penetration Testing):
Educates students on applying the concepts and tools from the CEH programme to a penetration testing methodology within a live cyber range environment.
CHFI (Computer Forensics):
Instructs students on a methodical approach to computer forensics, covering aspects such as searching and seizing, chain of custody, data acquisition, preservation, analysis, and the reporting of digital evidence.
Course Description
CEH offers a deep understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It teaches you to think and act like a malicious hacker, enabling you to better establish security infrastructure and defend against future threats. Understanding system weaknesses and vulnerabilities allows organisations to strengthen their security controls and minimise the risk of incidents.
The CEH programme is designed to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology. This provides you with the opportunity to demonstrate the knowledge and skills required to achieve the CEH credential. You will gain exposure to a fundamentally different perspective on the responsibilities and measures necessary for security.
Who Should Attend
- Law enforcement personnel
- System administrators
- Security officers
- Defence and military personnel
- Legal professionals
- Bankers
- Security professionals
About the Certified Ethical Hacker Master
To attain the CEH Master certification, you must pass the CEH Practical exam. This exam is designed to allow students to demonstrate their ability to execute the principles taught in the CEH course. The practical exam requires you to show the application of ethical hacking techniques, including threat vector identification, network scanning, operating system detection, vulnerability analysis, system hacking, and more.
The CEH Practical exam does not use simulations. Instead, you will engage with a live range designed to mimic a corporate network using live virtual machines, networks, and applications.
Successfully completing the challenges in the CEH Practical Exam is the next step after obtaining the Certified Ethical Hacker (CEH) certification. Passing both the CEH exam and the CEH Practical will earn you the additional CEH Master certification.
About the Certified Ethical Hacker Practical
To prove your proficiency in ethical hacking, we assess your abilities using real-world challenges in a realistic environment. You will use labs and tools to complete specific ethical hacking challenges within a time limit, mirroring the conditions you would face in the real world.
The EC-Council CEH (Practical) exam features a complex network that replicates a large organisation’s real-life infrastructure, consisting of various network systems (including DMZ, Firewalls, etc.). You must apply your ethical hacking skills to identify and exploit real-time vulnerabilities while auditing the systems.
About CPENT
EC-Council’s Certified Penetration Tester (CPENT) programme focuses on penetration testing. It teaches you to operate within an enterprise network environment that must be attacked, exploited, evaded, and defended. If you have only worked with flat networks, CPENT’s live practice range will elevate your skills. It covers penetration testing of IoT and OT systems, writing your own exploits, building custom tools, conducting advanced binary exploitation, double pivoting to access hidden networks, and customising scripts and exploits to reach the innermost segments of the network.
About CHFI
The Computer Hacking Forensic Investigator (CHFI) course delivers the digital forensics discipline from a vendor-neutral perspective. CHFI is a comprehensive course covering major forensic investigation scenarios, enabling students to gain hands-on experience with various forensic investigation techniques and standard tools necessary to successfully conduct computer forensic investigations.