From the course: Complete Guide to Cybersecurity: A Practical Approach

Unlock this course with a free trial

Join today to access over 25,200 courses taught by industry experts.

Understanding automated adversarial emulation

Understanding automated adversarial emulation

- [Instructor] Let's go over automated adversarial emulation. And this is basically whenever you're trying to simulate adversary or an attacker's tactics, techniques, and procedures in an automated way. You do this by employing different tools. There are different open-source tools like MITRE's Caldera, and other commercial tools like Cobalt Strike, SCYTHE, and many others. And we're going to go over those tools in the next few minutes. Now, there's a big difference between automated adversarial emulation and pen testing. In this case, AAE or automated adversarial emulation, basically you perform automated attacks on systems and networks and applications replicating the behavior of potential attackers. And in many cases, you're replicating the tactics and techniques host exploitation. Now again, the key components of automated adversarial emulation are tactics, techniques, and procedures, what we actually refer to as TTPs. There are different benefits of automated adversarial…

Contents