25.2.2
This website uses cookies to ensure you get the best experience on our website. Learn more

ATT&CK® Adversary Emulation Planning

The ATT&CK® Adversary Emulation Planning Badge certifies your ability to plan adversary emulation engagements that are representative of real-world threats and aligned with the organization’s cybersecurity objectives. This badge is for anyone interested in leveraging ATT&CK and adversary emulation as part of their cybersecurity assessment and improvement practices. Passing the assessment validates that you understand how to plan professional adversary emulation engagements to include defining objectives, scope, and rules of engagement. Meet the training and mastery assessment authors Michael Long II Capability Area Lead, Adversary Emulation at MITRE Michael Long is a Principal Adversary Emulation Engineer at the MITRE Corporation and a former U.S. Army Cyber Operations Specialist. Michael has over 10 years' experience in offensive and defensive cyber operations. Michael leads adversary emulation projects with MITRE to improve the cybersecurity of our nation’s most sensitive and critical networks. Michael has contributed to open-source projects including Metasploit and CALDERA. He is also the maintainer of the Offensive GoLang project. Michael has presented at events including Wild West Hackin’ Fest, DEFCON Adversary Village, and ATT&CKcon. Govardhen Arunagiri Offensive Security Engineer at MITRE Govardhen Arunagiri is an Offensive Security Engineer at the MITRE Corporation and former penetration tester at Praetorian. Govardhen applies his background in offensive cyber security assessments and his experience in adversary emulation to improve the security of sensitive environments both within and external to MITRE. Govardhen earned his B.S. in Computer Engineering from the University of Maryland, College Park, and is currently pursuing his M.S. in Information Security Engineering at the SANS Technology Institute.

Skills / Knowledge

  • Cybersecurity
  • ATT&CK
  • Threat Informed Defense
  • MAD
  • Adversary Emulation
  • Red Teaming