Attack Emulation Tools: Atomic Red Team, CALDERA and More w/ Darin and Carrie Roberts (16 Hours)

Attack Emulation Tools: Atomic Red Team, CALDERA and More w/ Darin and Carrie Roberts
4 Sessions – 4 Hour Classes

Instructors: Darin and Carrie Roberts


  • 16 hours of hands-on interactive learning 
  • Introduction to MITRE ATT&CK Framework and the ATT&CK Navigator
  • In-depth coverage of Atomic Red Team, MITRE CALDERA, and Prelude Operator
  • Overview of other emulation tools including PurpleSharp and Mordor
  • Intro to Vectr, a Purple Team campaign reporting tool
  • Interactive Exercises (Labs)
    • MITRE ATT&CK and the ATT&CK Navigator
    • Atomic Red Team
    • PurpleSharp
    • Vectr
  • Courseware
    • Downloadable slides and lab walkthroughs
    • Access to lab environment for six days starting the first day of class
    • Six months of access to recorded class sessions available within 24 hours of live event

Attack Emulation tools help you measure, monitor and improve your security controls by executing scripted attacks. Atomic Red Team and CALDERA are two open source attack emulation projects that are mapped directly to the MITRE ATT&CK Framework. This class will provide an overview of the MITRE ATT&CK framework and give you in-depth, hands-on knowledge of how to execute scripted attacks that exercise many of the techniques defined in MITRE ATT&CK. You will be provided with hands-on lab instructions for emulating a variety of attacks and creating visualizations using the MITRE ATT&CK Navigator. At the end of this class you will have the knowledge and tools to begin executing simulated attacks within your own test environment where you can create and validate detections in a script-able and consistent way.

Whether you are a student of information security or a seasoned network defender, there is something to learn from getting involved in the Attack Emulation space and this course will help you do that.


  • General understanding of MITRE ATT&CK and Attack Emulation tools
  • In-depth knowledge of Atomic Red Team and tools for executing this library of attacks
  • Understanding of how Attack Emulation can help you build and validate your detections
  • General understanding of other available Attack Emulation tools


Anyone interested in learning more about cyber attacks and tools to emulate and report on them through hands-on labs should take this course.

  • Defenders and Blue Teamers
  • Students interested in Information Security
  • Penetration testers and Red Teamers
  • General Security Practitioners


Entry level through advanced information security skills. 


General familiarity with the Windows and Linux operating systems. 


  • Internet connectivity
  • Remote Desktop Protocol (RDP) client


  • Downloadable course slides and lab walkthroughs
  • RDP access to a Windows 10 client in Azure for running labs. Lab access starts on the first day of class and is available for six days only.

Instructor Bios

Darin Roberts
Darin Roberts is a penetration tester, security analyst, and prolific blogger for Black Hills Information Security. He has completed several GIAC certifications including, GSEC, GCFE, GCIA, and GCIH. He has B.S. degrees in Computer Information Technology and Engineering and a Master’s degree in Teaching. He enjoys teaching and sharing his knowledge with others, especially through his 16-hour course on “Attack Emulation Tools: Atomic Red Team, CALDERA and More …” that he teaches on a regular basis through Wild West Hackin’ Fest Training.


Carrie Roberts
Carrie Roberts is a web application developer, turned pentester, turned red teamer, turned blue. She loves to learn and give back to the community. She is currently one of the primary Atomic Red Team project maintainers and developers and has developed many of her own open source tools including the Domain Password Audit Tool (DPAT) and Slack Extract. She holds master’s Degrees in both Computer Science and Information Security Engineering. She has earned 12 GIAC certifications including the prestigious “Security Expert” (GSE) certification. She has spoken at numerous security conferences including DerbyCon and Wild West Hackin’ Fest, published many blog posts on topics ranging from social engineering to bypassing anti-virus, and contributed new research on the VBA Stomping maldoc technique. She is currently a Defense Engineer at Fortune 1.



Tue, September 21, 2021 9:00 AM – 5:00 PM MT

Wed, September 22, 2021 9:00 AM – 5:00 PM MT

Training Type: Virtual

Event: Deadwood 2021

Register to attend this course virtually in September

Tue, October 19, 2021 11:00 AM – 4:00 PM ET

Wed, October 20, 2021 12:00 PM – 4:00 PM ET

Thu, October 21, 2021 12:00 PM – 4:00 PM ET

Fri, October 22, 2021 12:00 PM – 4:00 PM ET

Register to attend this course virtually in October

Join the Wild West Hackin’ Fest Discord server to stay updated on future training and webcasts: Join Our Server!