25.2.2
This website uses cookies to ensure you get the best experience on our website. Learn more

ATT&CK® Adversary Emulation Fundamentals

ATT&CK® Adversary Emulation Fundamentals certifies a practitioner’s understanding of foundational adversary emulation concepts and ability to execute an adversary emulation plan based on ATT&CK. Meet the training and mastery assessment authors Michael Long II Capability Area Lead, Adversary Emulation at MITRE Michael Long is a Principal Adversary Emulation Engineer at the MITRE Corporation and a former U.S. Army Cyber Operations Specialist. Michael has over 10 years' experience in offensive and defensive cyber operations. Michael leads adversary emulation projects with MITRE to improve the cybersecurity of our nation’s most sensitive and critical networks. Michael has contributed to open-source projects including Metasploit and CALDERA. He is also the maintainer of the Offensive GoLang project. Michael has presented at events including Wild West Hackin’ Fest, DEFCON Adversary Village, and ATT&CKcon. Govardhen Arunagiri Offensive Security Engineer at MITRE Govardhen Arunagiri is an Offensive Security Engineer at the MITRE Corporation and former penetration tester at Praetorian. Govardhen applies his background in offensive cyber security assessments and his experience in adversary emulation to improve the security of sensitive environments both within and external to MITRE. Govardhen earned his B.S. in Computer Engineering from the University of Maryland, College Park, and is currently pursuing his M.S. in Information Security Engineering at the SANS Technology Institute. To consider before earning the badge Pre-requisites: - Practitioners should have a solid understanding of the ATT&CK Framework - Competent with basic Windows and Linux command line tools Not required but recommended: - Familiarity with common red team tools and techniques (example: Metasploit) - An understanding of cyber threat intelligence practices through the ATT&CK Cyber Threat intelligence course

Skills / Knowledge

  • ATT&CK
  • Cybersecurity
  • Threat-Informed Defense
  • Security Operations
  • Adversary Emulation
  • Cyber Threat Intelligence