25.10.0
This website uses cookies to ensure you get the best experience on our website. Learn more

Adversary Tactics: Red Team Operations

Upgrade your red team tradecraft with cutting-edge Tactics, Techniques, and Procedures (TTPs) used by attackers in real-world breaches. This course will teach students how to infiltrate networks, gather intelligence, and covertly persist to simulate advanced adversaries. Students will use the skillsets taught in this course to go up against live incident responders in an enterprise lab environment designed to mimic an enterprise network and learn to adapt and overcome active response operations through collaborative feedback as the course progresses.Topics covered include:Design and deploy sophisticated, resilient covert attack infrastructureGain an initial access foothold on systems using client-side attacks in real-world scenariosUtilize advanced Active Directory attack techniques to execute domain enumeration, escalation, and persistencePerform sophisticated post-exploitation actions, including sophisticated data mining, going beyond just achieving Domain AdminUse cutting-edge lateral movement methods to move through the enterprisePractice offense-in-depth by utilizing a variety of tools and techniques in response to defender actions and technical defensesEffectively train network defenders to better protect themselves against advanced, persistent adversaries

Skills / Knowledge

  • Network
  • PenTesting

Issued on

August 8, 2023

Expires on

Does not expire