Module 2: The Attacker’s Playbook (MITRE ATT&CK Simplified)
Section outline
-
Purpose: Awareness, not technical mastery
Key Topics
- How attacks actually happen (step-by-step)
- Phishing, credential theft, ransomware, insider misuse
- Why most attacks succeed due to human and process gaps
Framework Mapping
- MITRE ATT&CK: Tactics overview
- Initial Access
- Credential Access
- Lateral Movement
- Impact
Product Link
- CHI Threat Exposure Mapping
- Showing how CHI aligns attack paths with your controls
Practical Exercise
- “Could this attack work on my business?”
- CHI scenario-based risk scoring