دوره Red Team Tools

MITRE ATT&CK® is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community. Further details on the MITRE ATT&CK® framework can be found at https://attack.mitre.org/ Our red team operations tooling courses map to the MITRE ATT&CK® matrix tactics, techniques, and procedures. Each course focuses on the use of a specific industry-standard, generally open source, tool to carry out adversary emulation. Knowing what a tool is and how it can perform a specific task, will ultimately lend to your ability as an organization or an individual to detect and defend against specific attack vectors.

Syllabus

  1. Introduction
  2. ATT&CK – Reconnaissance (TA0043)
  3. ATT&CK – Resource Development (TA0042)
  4. ATT&CK – Initial Access (TA0001)
  5. ATT&CK – Execution (TA0002)
  6. ATT&CK – Persistence (TA0003)
  7. ATT&CK – Privilege Escalation (TA0004)
  8. ATT&CK – Defense Evasion (TA0005)
  9. ATT&CK – Credential Access (TA0006)
  10. ATT&CK – Discovery (TA0007)
  11. ATT&CK – Lateral Movement (TA0008)
  12. ATT&CK – Collection (TA0009)
  13. ATT&CK – Command and Control (TA0011)
  14. ATT&CK – Exfiltration (TA0010)
  15. ATT&CK – Impact (TA0040)