Introduction To Red Teaming - Heist Edition
If you've been penetration testing and want to move up to red teaming, then this course is for you.
It is often said that penetration testers emulate other penetration testers rather than real threat actors, leaving organizations exposed to what they miss. This course aims to change that. By combining our red teaming experience with two decades of teaching experience, we've put together a course to teach you how to test your organizations like a real criminal would; getting Domain Admin isn't the goal.
This course covers some of our unique red teaming approaches including; a repeatable methodology for AV and EDR bypasses, a focus on business system compromise with a fully functional SWIFT environment, as well as newer technologies such as Kubernetes.
You’ll be exposed to the techniques, tactics and procedures actively used in red team engagements by our analysts.
Skills / Knowledge
- PenTesting
- Defense