Instructor: Carrie Roberts
Course Length: 16-Hours
Price:
Includes: 12 months of complimentary access to the Antisyphon Cyber Range, certificate of participation, six months access to class recordings.
Attack Emulation tools help you measure, monitor and improve your security controls by executing scripted attacks. Atomic Red Team and CALDERA are two open source attack emulation projects that are mapped directly to the MITRE ATT&CK Framework. This class will provide an overview of the MITRE ATT&CK framework and give you in-depth, hands-on knowledge of how to execute scripted attacks that exercise many of the techniques defined in MITRE ATT&CK. You will be provided with hands-on lab instructions for emulating a variety of attacks and creating visualizations using the MITRE ATT&CK Navigator. At the end of this class you will have the knowledge and tools to begin executing simulated attacks within your own test environment where you can create and validate detections in a script-able and consistent way.
Whether you are a student of information security or a seasoned network defender, there is something to learn from getting involved in the Attack Emulation space and this course will help you do that.
KEY TAKEAWAYS
- General understanding of MITRE ATT&CK and Attack Emulation tools
- In-depth knowledge of Atomic Red Team and tools for executing this library of attacks
- In-depth knowledge of MITRE Caldera and Prelude Operator
- General understanding of other emulation tools including PurpleSharp
- General understanding of Vectr, a Purple Team campaign reporting tool
WHO SHOULD TAKE THIS COURSE
Anyone interested in learning more about cyber attacks and tools to emulate and report on them through hands-on labs should take this course.
- Defenders and Blue Teamers
- Students interested in Information Security
- Penetration testers and Red Teamers
- General Security Practitioners
AUDIENCE SKILL LEVEL
Entry level through advanced information security skills.
STUDENT REQUIREMENTS
General familiarity with the Windows and Linux operating systems.
WHAT EACH STUDENT SHOULD BRING
- Internet connectivity
- Remote Desktop Protocol (RDP) client
WHAT STUDENTS WILL BE PROVIDED WITH
- 16 hours of hands-on interactive learning
- Interactive Exercises (labs)
- Downloadable course slides and lab walkthroughs
- RDP access to a Windows 10 client in Azure for running labs. Lab access starts on the first day of class and is available for six days only.
TRAINER & AUTHOR

Carrie Roberts
Carrie Roberts is a web application developer, turned pentester, turned red teamer, turned blue. She loves to learn and give back to the community. She is currently one of the primary Atomic Red Team project maintainers and developers and has developed many of her own open source tools including the Domain Password Audit Tool (DPAT) and Slack Extract. She holds master’s Degrees in both Computer Science and Information Security Engineering. She has earned 12 GIAC certifications including the prestigious “Security Expert” (GSE) certification. She has spoken at numerous security conferences including DerbyCon and Wild West Hackin’ Fest, published many blog posts on topics ranging from social engineering to bypassing anti-virus, and contributed new research on the VBA Stomping maldoc technique. She is currently a Defense Engineer at Fortune 1.
COURSE SCHEDULE
Tues, June 14, 2022 11:00 AM – 4:00 PM ET
Wed, June 15, 2022 12:00 PM – 4:00 PM ET
Thu, June 16, 2022 12:00 PM – 4:00 PM ET
Fri, June 17, 2022 12:00 PM – 4:00 PM ET