25.9.12
This website uses cookies to ensure you get the best experience on our website. Learn more

Adversary Tactics: Tradecraft Analysis

Your organization has just implemented the leading detection and response products. Are they configured with default configuration? How much faith should you have in your ability to detect sophisticated attacks? How would you simulate attacks to ensure robust detections are in place? This course will teach the importance of understanding the inner workings of attack techniques and telemetry availability and provide a workflow for developing robust detection analytics or data driven evasion decisions. Focusing on various Windows components and attacker TTPs, you will dive deep into how software abstracts underlying capabilities and how attackers can interact with deeper layers to bypass superficial detection capabilities

Skills / Knowledge

  • PenTesting
  • Defense

Issued on

August 6, 2024

Expires on

Does not expire