We’ve been hit, how can CyberDefenses help? Incident Hotline

Cyber Defenses Academy

Adversary Tactics Techniques and Procedures


Currently Unavailable - Join the waitlist to be emailed when this product becomes available

Product Description

Course Objectives

Through the user interactive labs the student will learn:

  • Adversary fundamentals
  • Profiling techniques
  • Analysis techniques
  • TTP discovery and identification techniques
  • Assessment Methodology

Date & Time

Target Student

Threat intelligence, and information security professionals, forensic investigators or others requiring an understanding of how to handle the challenges of threat intelligence.


Round Rock Location
CyberDefenses Academy
1205 Sam Bass Road, Suite 300
Round Rock, TX 78681
(512) 255-3700

San Antonio Location
CyberDefenses Academy
San Antonio, TX

Your Instructor

Monty St John

Monty St John has been in the security world for more than two decades. When he is not responding to incidents he teaches classes in Threat Intelligence, Incident Response and Digital Forensics.


Certification of Completion

Additional Information

This course is an investigative journey into adversary tradecraft. The students will begin with a deep dive into the profiles of past and active threat actors. Beyond a high overview, this cliff dive explores the thought process, code and actions that lead up to, during and after the execution of tactics. Students will analyze adversary profiles to build an understanding of the how and why one tactic is used over another and what goal or strategy drives that thought process. Students will also learn the profiling techniques necessary to fingerprint these methods and then match them to known and unknown adversaries. During this period, students are challenged with a series of interactive labs to build on the knowledge they have acquired. When a student leaves this 5-day intensive class they will have a practical understanding and experience in adversary tactics, techniques and procedures. They will also take with them a Threat Intelligence knowledge base of adversary profiles, TTPs and the hints, risk signals and flags that give away their existence.

Need help figuring out which cyber security solution is optimal for your company?