Course : Cybersecurity, Adversary Emulation

emulate the opponent to simulate advanced attacks

Practical course - 2d - 14h00 - Ref. RTA
Price : 1390 € E.T.

Cybersecurity, Adversary Emulation

emulate the opponent to simulate advanced attacks


New course

Adversary emulation is a cybersecurity assessment method that replicates the tactics, techniques and procedures (TTPs) of real-world threat actors in order to assess and improve an organization's security defenses. This training will enable you to simulate real-world attacks, understand adversarial techniques, and test your detection and response capabilities in a controlled environment.


INTER
IN-HOUSE
CUSTOM

Practical course
Disponible en anglais, à la demande

Ref. RTA
  2d - 14h00
1390 € E.T.




Adversary emulation is a cybersecurity assessment method that replicates the tactics, techniques and procedures (TTPs) of real-world threat actors in order to assess and improve an organization's security defenses. This training will enable you to simulate real-world attacks, understand adversarial techniques, and test your detection and response capabilities in a controlled environment.


Teaching objectives
At the end of the training, the participant will be able to:
Understanding the strategic benefits of adversary emulation
Using Atomic Red Team in a MITRE ATT&CK approach
Deploy a realistic scenario with Caldera and/or Atomic Red Team
Interpreting results, detecting and reinforcing defensive posture

Intended audience
SOC analysts, blue teamers, pentesters, red teamers, security managers, security administrators.

Prerequisites
Good knowledge of IS security, networks and systems.

Course schedule

1
Adversary Emulation 101

  • Definitions and key concepts.
  • Emulation, simulation and pentesting: comparison and why emulate?
  • Proactive defensive posture, aligned with real threats.

2
Discover MITRE ATT&CK

  • Introducing the MITRE ATT&CK and D3FEND matrices.
  • Tools for emulating tactics, techniques and procedures (TTP).
Hands-on work
Identify the TTPs of an APT group.

3
Atomic Red Team

  • Presentation of Atomic Red Team, Atomic CLI, Invoke-Atomic.
  • How to use a test, adapt it, and create one.
Hands-on work
Simple TTP tests (e.g. exfiltration, persistence, recognition).

4
Creating an emulated attack mini-campaign with Atomic Red Team

  • Build a mini-attack campaign.
  • Run tests with Atomic CLI or Invoke-Atomic.
  • Observation of logs and impacts on the target machine.
Hands-on work
Build an attack campaign and observe traces and impacts on the target machine.

5
Atomic Red Team TTP detection and correlation

  • Which logs, which Sigma, YARA, or EDR detection rules?
  • Implementation of collection, correlation and investigation tools to track down malicious activity.
Hands-on work
Detection of TTPs generated by Atomic RedTeam.

6
Caldera

  • Opponent emulation platform: Caldera.
  • Presentation and difference with ART: agents, automatic sequences.
  • Demonstration and implementation of an automated scenario.
Hands-on work
Setting up agents and running a Caldera scenario.

7
AI and cybercriminals

  • Use of AI by attackers (polymorphic scripts, GPT in the attack).
  • Emerging threats (LLM poisoning, AI jailbreak, social engineering 2.0).
  • Adapting adversary emulation to augmented threats.

8
Purple Team Challenge

  • How to integrate Atomic Red Team into a security pipeline.
  • Best practices for enriching SOC use cases.
  • Resources, community projects, ready-to-use scenarios.
Hands-on work
Offensive/defensive simulation: one team attacks, the other detects, review of results, scoring based on MITRE.


Dates and locations
Select your location or opt for the remote class then choose your date.
Remote class

Dernières places
Date garantie en présentiel ou à distance
Session garantie

REMOTE CLASS
2026 : 19 Mar., 9 June, 24 Sep., 17 Dec.

PARIS LA DÉFENSE
2026 : 19 Mar., 9 June, 24 Sep., 17 Dec.