Part 1 and Part 2 - Set up a small virtualization environment (2 small VMs)
Part 3 - Put on your adversary hat, it's time to make (and observe) some noise
Part 4 - Emulating an adversary for crafting detections
Part 5 - Blocking an attack
Part 6 - Tuning false positives
Part 7 - Trigger YARA scans with a detection rule
Resources:
Eric Capuano Lab Link
Lab Video by Gerald Auger