back to day 7
WEEK_1 · DAY_07 · LAB
Lab 7 — Map a Real Breach
Threat frameworks that drive every modern detection program
LAB PROGRESS0/4 steps · 0%
Lab Objectives
- ›Use the Lockheed Cyber Kill Chain to describe a breach
- ›Navigate the MITRE ATT&CK matrix (tactics, techniques, sub-techniques)
- ›Map a real breach to ATT&CK
- ›Understand the Diamond Model and Pyramid of Pain
Lab Instructions
- 1Pick a public breach (Target 2013, SolarWinds, Colonial Pipeline).
- 2Walk it through the Kill Chain — list one event per stage.
- 3Map each event to an ATT&CK technique ID.
- 4Identify which stages your imaginary SOC would have detected.