Adversary Tactics - Red Team Operations
Upgrade your red team tradecraft with cutting-edge Tactics, Techniques, and Procedures (TTPs) used by attackers in real-world breaches. This course will teach students how to infiltrate networks, gather intelligence, and covertly persist to simulate advanced adversaries. Students will use the skillsets taught in this course to go up against live incident responders in an enterprise lab environment designed to mimic an enterprise network and learn to adapt and overcome active response operations through collaborative feedback as the course progresses.
Topics covered include:
Design and deploy sophisticated, resilient covert attack infrastructure
Gain an initial access foothold on systems using client-side attacks in real-world scenarios
Utilize advanced Active Directory attack techniques to execute domain enumeration, escalation, and persistence
Perform sophisticated post-exploitation actions, including sophisticated data mining, going beyond just achieving "Domain Admin"
Use cutting-edge lateral movement methods to move through the enterprise
Practice "offense-in-depth" by utilizing a variety of tools and techniques in response to defender actions and technical defenses
Effectively train network defenders to better protect themselves against advanced, persistent adversaries
Skills / Knowledge
- PenTesting
- Network