Red Teaming
The course structure comprises of various types of attacker simulators and industry attack frameworks such as Cyber Kill Chain, Attack Tree and MITRE ATT&CK Framework. Candidates get the opportunity to behave like an adversary and creatively use local, built-in tools to reach business goals while preventing detection.
Furthermore, the course focuses on making use of open-source resources such as tools and scripts and then tweaking them to complement an organization’s specific needs. On performing nefarious cyber-attack exercises that simulate real-world threat vectors, students will gain hands-on experience.
Prerequisites
Prior experience of conducting penetration tests and security assessments of web applications using the OWASP top 10, IT administration. Understanding of the Windows operating system, registry and use of the Windows command line. Experience with Active Directory, common network protocols, Linux operating systems and file systems.
Course Modules
Module 1: Introduction
Module 2: Initial Access & Delivery
Module 3: Weaponization
Module 4: Command & Control
Module 5: Escalate Privileges
Module 6: Credentials Dumping
Module 7: Active Directory
Module 8: Lateral Movement
Module 9: Establishing Persistence
Module 10: Data Exfiltration
Module 11: Defense Evasion
Module 12: Reporting
Why choose this course?
- To understand the effects of the breach of confidentiality.
- Assess the knowledge of information security for the internal personnel.
- Discover the shortcomings in your development and research systems.
- Check the team’s incident response capability
- To check the security controls such as WAF, IDS / IPS, Load Balancer
- To test the capacity of your company to defend your vital assets from a real-world assault.
Contact us: http://bit.ly/ignitetechnologies