Adversary Tactics - Detection Training Course
Date: 09 Jun 2020

Tired of "detecting" a breach after an incident has already begun? Hunt operations focus on proactively searching for malicious threat actors and closing the gap from infection to detection. Many security solutions attempt to prevent the initial compromise, or detect known post-exploitation activity, but can be bypassed by skilled attackers. This course will teach you how to create threat hunting hypothesis and execute them in your environment to proactively search for attacker indicators not identified by existing security solutions.

In this course, you will:

Build a comprehensive Hunt Hypothesis.
Assess the quality of your data sources.
Develop metrics to track the effectiveness of your hunt program.
Perform basic triage procedures for suspicious activity.
Practice in a simulated enterprise network against real advanced adversary techniques and malware samples.
Collect extensive Windows host telemetry and metadata using built-in and open source tools.
Efficiently analyze gathered data to detect threat actor post-exploitation technique.

Adversary Tactics - Red Team Operations Training Course
Date: 09 Jun 2020

Upgrade your Red Team engagements with bleeding-edge Tactics, Techniques, and Procedures (TTPs) used by attackers in real-world breaches. This course will teach students how to infiltrate networks, gather intelligence, and covertly persist in a network like an advanced adversary. Students will use the skillsets taught in Adversary Tactics: Red Team Ops to go up against live incident responders in an enterprise lab environment designed to mimic a mature real-world network. Students will learn to adapt and overcome Blue Team response through collaborative feedback as the course progresses.

Topics covered include:

Design and deploy sophisticated, resilient covert attack infrastructure
Gain an initial access foothold on systems using client-side attacks in real-world scenarios
Utilize advanced Active Directory attack techniques to execute domain enumeration, escalation, and persistence
Perform sophisticated post-exploitation actions, including sophisticated data mining, going beyond just achieving “Domain Admin”
Use cutting-edge lateral movement methods to move through the enterprise
Practice “offense-in-depth” by utilizing a variety of tools and techniques in response to defender actions and technical defenses
Effectively train network defenders to better protect themselves against advanced, persistent adversaries

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information