25.9.10
This website uses cookies to ensure you get the best experience on our website. Learn more

Intrusion Operations

The Intrusion Operations class provides all students a unique opportunity to leverage real-world techniques used by advanced adversaries. You will learn how to overcome enterprise defenses and hardened infrastructure. In addition, you will develop targeted malware profiles to help you succeed and remain undetected. Custom tooling and configurations are what will get you in and keep you in. An attacker can easily break in by abusing default configurations, but the inverse also applies - defenders can easily detect red teams and malicious actors using commodity malware, default indicators, and more. You will leave this class with the skills and tools to develop custom tradecraft for long persistence. This class is taught by Chris Truncer, a respected and accomplished red teamer and developer of the Veil Framework, EyeWitness, WMImplant, and other widely used tools within the security industry.

Skills / Knowledge

  • PenTesting
  • Malware

Issued on

August 6, 2019

Expires on

Does not expire