YoVDO

MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training

Offered By: Cybrary

Tags

Mitre Att&ck Framework Courses Cybersecurity Courses Threat Intelligence Courses Threat Modeling Courses

Course Description

Overview

This journey begins with the MITRE ATT&CK® framework, a globally-accessible knowledge base and model for cyber adversary behavior based on real-world observations.

ATT&CK® Fundamentals will not only familiarize you with how the ATT&CK® knowledge base documents real-world adversary tactics, techniques, and procedures (TTPs), but also introduce the various ways we can exploit this understanding of adversary TTPs to address current (operational) and future (strategic) threats. Together we will explore how ATT&CK® enables us to produce measurable and trackable answers to the hard questions we face every day as defenders (such as “how does our decision to make us better/worse at defending against threats?”), making us more threat-focused and informed security practitioners.

Target Audience

Anyone involved or interested in threat modeling and applying this knowledge to improve how you and your organization defends against adversaries.

Prerequisites

A general understanding of information security and technology as well as their associated threats (i.e. malicious actors and malware).

Course Goals

By the end of this course, students should be able to:

  • Understand the structure and philosophy that continually shapes ATT&CK®
  • Identify the available ATT&CK® resources and operational use cases
  • Recognize how ATT&CK® empowers defenders through understanding threats

Note: Per our partnership agreement with MITRE Engenuity, MITRE will have access to learner usage data.


Syllabus

  • Understanding ATT&CK®
    • Introduction to ATT&CK®
    • Matrices/Platforms
    • Tactics
    • Techniques and Sub-Techniques
    • Mitigations
    • Data Sources and Detections
    • Groups and Software
    • How ATT&CK® Grows and Evolves
  • Benefits of Using ATT&CK®
    • Community Perspective
    • Common Language
    • Quantitative Scorecard
    • ATT&CK® Navigator
  • Operationalizing ATT&CK®
    • Cyber Threat Intelligence
    • Detection and Analysis
    • Threat Emulation
    • Assessment and Engineering
    • Putting it all Together into Threat-Informed Defense
    • Course Summary

Taught by

Jamie Williams

Related Courses

Proactive Computer Security
University of Colorado System via Coursera
Security in Office 365
Microsoft via edX
Threat Detection: Planning for a Secure Enterprise
Microsoft via edX
Cyber Threat Intelligence
IBM via Coursera
Security Analyst Fundamentals
IBM via Coursera