Tommi Hovi
The ATT&CK® Adversary Emulation TTP Research Badge certifies your ability to research adversary TTPs, select an adversary to emulate, and develop a TTP outline. This badge is for anyone interested in leveraging ATT&CK and adversary emulation as part of their cybersecurity assessment and improvement practices. Passing the assessment validates that you understand how to research adversary TTPs to support adversary emulation activities that are representative of real-world threats.
Meet the training and mastery assessment authors
Michael Long II
Capability Area Lead, Adversary Emulation at MITRE
Michael Long is a Principal Adversary Emulation Engineer at the MITRE Corporation and a former U.S. Army Cyber Operations Specialist. Michael has over 10 years' experience in offensive and defensive cyber operations. Michael leads adversary emulation projects with MITRE to improve the cybersecurity of our nation’s most sensitive and critical networks. Michael has contributed to open-source projects including Metasploit and CALDERA. He is also the maintainer of the Offensive GoLang project. Michael has presented at events including Wild West Hackin’ Fest, DEFCON Adversary Village, and ATT&CKcon.
Govardhen Arunagiri
Offensive Security Engineer at MITRE
Govardhen Arunagiri is an Offensive Security Engineer at the MITRE Corporation and former penetration tester at Praetorian. Govardhen applies his background in offensive cyber security assessments and his experience in adversary emulation to improve the security of sensitive environments both within and external to MITRE. Govardhen earned his B.S. in Computer Engineering from the University of Maryland, College Park, and is currently pursuing his M.S. in Information Security Engineering at the SANS Technology Institute.
Skills / Knowledge
- cybersecurity
- adversary emulation
- red teaming
- threat informed defense
- ATT&CK
Issued on
April 12, 2023
Expires on
Does not expire