Red Team Tools for Emulated Adversary Techniques with MITRE ATT&CK

Red team operations are most effective when tailored to test an organization's defenses against the most likely threat. Learn to leverage MITRE ATT&CK in combination with open source tools in the red team tools path to emulate APT attacks.
Course info
Level
Intermediate
Updated
Apr 30, 2020
Duration
17m
Table of contents
Description
Course info
Level
Intermediate
Updated
Apr 30, 2020
Duration
17m
Description

Resources and time are limited and validation of security operations capabilities and defenses is elusive if not non-existent. Red team operations of all different shapes and sizes fill in this gap, but where do you start? In this course, Red Team Tools for Emulated Adversary Techniques with MITRE ATT&CK, you will gain the ability to prioritize and emulate techniques based on threat groups with the capability and intent to threaten your organization. First, you will learn about the different implementation of red team expertise within organizations. Next, you will discover the relationship between the tools and APT MITRE ATT&CK techniques Finally, you will explore how to operationalize adversary threat intelligence with ATT&CK Navigator. When you are finished with this course, you will have the skills and knowledge of red team tools for emulated adversary techniques with MITRE ATT&Ck needed to leverage the red team tools path to emulate threats and validate your organization's security operations.

About the author
About the author

Aaron M. Rosenmund is a cyber security operations subject matter expert, with a background in federal and business defensive and offensive cyber operations and system automation.

More from the author
Threat Hunting with PySpark
Intermediate
16m
Nov 24, 2020
Set Up PySpark for Data Analysis
Beginner
9m
Nov 24, 2020
Command and Control with Covenant
Intermediate
19m
Nov 4, 2020
More courses by Aaron Rosenmund
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
[Autogenerated] welcome to Pluralsight in this course Red team tools to emulate adversary techniques with minor attack, covering the use case for red teams, their tools and how they map to the attack framework. This course serves as the cornerstone for the red team operators, pin testers or even aggressive blue team members going the extra mile to validate defenses who are interested in learning how to utilize open source red team tools. I explain the relationship between minor attack operational threat intelligence and how that allows you to narrow in your operations on specific techniques, emulating specific adversaries that error the most likely threats to your organization. You will get experience with the intact Navigator and walk through planning out the techniques that you need to emulate, which will provide a roadmap for which courses and tools that you need from the red team tools path. If you're looking to leverage Red Team tools to emulate adversaries in a way that focuses on business impact and relevance over the full life cycle is a compromise thin? Come learn how to leverage this path. An open source. Tools to validate your defenses against advanced adversary attacks. Your app Pluralsight