Get in Touch

Course Outline

Introduction

What is Malware?

  • Types of malware
  • The evolution of malware

Overview of Malware Attacks

  • Propagating
  • Non-propagating

ATT&CK Matrices

  • Enterprise ATT&CK
  • Pre-ATT&CK
  • Mobile ATT&CK

MITRE ATT&CK

  • 11 tactics
  • Techniques
  • Procedures

Preparing the Development Environment

  • Setting up a version control repository (GitHub)
  • Downloading a project that hosts a data-based to-do list system
  • Installing and configuring ATT&CK Navigator

Monitoring a Compromised System (WMI)

  • Deploying command-line scripts to conduct a lateral attack
  • Using ATT&CK Navigator to identify the compromise
  • Assessing the compromise through the ATT&CK framework
  • Performing process monitoring
  • Documenting and patching gaps in the defence architecture

Monitoring a Compromised System (EternalBlue)

  • Deploying command-line scripts to conduct a lateral attack
  • Using ATT&CK Navigator to identify the compromise
  • Assessing the compromise through the ATT&CK framework
  • Performing process monitoring
  • Documenting and patching gaps in the defence architecture

Summary and Conclusion

Requirements

  • A foundational understanding of information systems security

Audience

  • Information systems analysts
 7 Hours

Number of participants


Price per participant

Testimonials (2)

Provisional Upcoming Courses (Require 5+ participants)

Related Categories