![]() |
BlackHat - Adversary Emulation and Purple Teaming - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: BlackHat - Adversary Emulation and Purple Teaming (/Thread-BlackHat-Adversary-Emulation-and-Purple-Teaming) |
BlackHat - Adversary Emulation and Purple Teaming - BaDshaH - 02-24-2024 ![]() MP4 | Video: H264 1920x1080 | Audio: AAC 48000Hz 2 Ch Language: English | Duration: 25+ hours | Size: 4.14 GB In this four-day course, the attendees will walk through the Purple Team Exercise Framework, learning each role that plays a part in purple team engagements. Students will learn to collect Cyber Threat Intelligence (CTI), develop and conduct Adversary Emulation plans based on gathered intelligence, then dive into detection engineering to identify and resolve missed detection opportunities. Each day is a dive into one of the roles, and the course will conclude with a capstone that puts it all together in a purple team engagement. This intermediate-level course aims to broaden the students' understanding of purple team engagements' different roles and responsibilities and is geared towards red teamers, blue teamers, intelligence analysts, and managers looking to expand their purple team capabilities. Day 1 Introductions Module 1: Intro to Purple Module 2: Threat/Adversary Emulation Module 3: Intro to Threats Module 4: Threat Modeling Module 5: Threat Analysis Module 6: Emulation Plans Day 2 Module 7: Exercise Methodologies Module 8: Testing Tools Module 9: Capability Management Module 10: Capability Development Module 11: Adaptive Emulation Module 12: Exercise Execution Day 3 Module 13: Strategic Drivers of Detection Engineering Module 14: Detection Engineering Process Module 15: Common Detection Opportunity Types Day 4 Module 16: An Exercise Framework (PTEF) Module 17: Capstone Prep Capstone Project (CTF) KEY TAKEAWAYS Students will learn how to develop adversary emulation plans Students will learn how to build and assess detections Students will learn how to perform purple team exercises in an interactive or automated fashion WHO SHOULD TAKE THIS COURSE This training is for security analysts, cyber threat intelligence analysts, red teams, and blue teams that want to add more purple teaming to their daily lives. STUDENT REQUIREMENTS Intermediate level understanding of red or blue team concepts. WHAT STUDENTS SHOULD BRING Laptop with web browser Remote Desktop Protocol (RDP) Client WHAT STUDENTS WILL BE PROVIDED WITH Courseware Purple Team Exercise Framework Adversary Emulation Plans C2 Matrix Virtual Machine Detection rules and cheat sheets Homepage |