- Patrick ClearyFortyNorth SecurityInitial Access OperationsSarah TyraAugust 2 - 3 - 16 Credit Hours

Patrick Cleary
FortyNorth Security
Initial Access Operations
Sarah Tyra
August 2 - 3 - 16 Credit Hours
Patrick Cleary
"Red team classes cover a typical range of topics such as reconnaissance, initial access, post-exploitation, and more. However, the sheer volume of material covered in each of these steps really stymies a student's ability to take a deep dive on any individual topic. We're changing that narrative with a course fully dedicated to Initial Access Operations.
Initial Access Operations is designed to immerse you in multiple techniques that attackers (and red teams) use to gain initial access into a targeted environment.
We'll look at credential harvesting techniques attackers commonly use when enticing victims to authenticate into a malicious (web) application. We'll also review the most effective methods of weaponizing office documents, which are still widely employed by attackers and red teams due to high success rates. Additionally, we'll learn about browser-based attacks, which can provide unique opportunities for attackers to remain largely in memory. Finally, we'll discuss different ways to protect malicious code by only allowing it to run on the specific system(s) you are targeting.
By the end of this course, you will be proficient in employing various methods of compromising targets as well building your own malware."
Skills / Knowledge
- Pentesting
- Malware
Issued on
August 3, 2021
Expires on
Does not expire