25.8.14
This website uses cookies to ensure you get the best experience on our website. Learn more

Adversary Tactics - Red Team Operations

Upgrade your red team tradecraft with cutting-edge Tactics, Techniques, and Procedures (TTPs) used by attackers in real-world breaches. This course will teach students how to infiltrate networks, gather intelligence, and covertly persist to simulate advanced adversaries. Students will use the skillsets taught in this course to go up against live incident responders in an enterprise lab environment designed to mimic an enterprise network and learn to adapt and overcome active response operations through collaborative feedback as the course progresses. Topics covered include: Design and deploy sophisticated, resilient covert attack infrastructure Gain an initial access foothold on systems using client-side attacks in real-world scenarios Utilize advanced Active Directory attack techniques to execute domain enumeration, escalation, and persistence Perform sophisticated post-exploitation actions, including sophisticated data mining, going beyond just achieving "Domain Admin" Use cutting-edge lateral movement methods to move through the enterprise Practice "offense-in-depth" by utilizing a variety of tools and techniques in response to defender actions and technical defenses Effectively train network defenders to better protect themselves against advanced, persistent adversaries

Skills / Knowledge

  • PenTesting
  • Network