Course Summary

This course provides you with the essential knowledge and skills to combat today’s evolving threats. Recognizing that a purely preventative approach is no longer enough, this course introduces a comprehensive set of security controls designed to stop, detect, and respond to cyber adversaries.

You will gain expertise in both offensive and defensive cybersecurity strategies, learning how advanced cyber adversaries operate and how to strengthen your IT environment to better prevent, detect, and respond to threats.

Key topics include:

Advanced persistent threat models and techniques
Detecting and preventing payload deliveries, exploitation, and post-exploitation activities
Leveraging cyber deception for threat intelligence, hunting, and incident response
Adversary emulation and simulation

Active Directory/Domains
You will develop a deep understanding of key concepts related to Active Directory and domains, including the basics of authentication, the Kerberos protocol, common domain attacks, and methods for identifying and mitigating domain-specific threats.

Administrative Access
You will learn about privilege escalation tactics, the risks associated with elevated access, and the critical importance of “least privilege” principles to secure administrative rights and reduce the attack surface.

Adversary Emulation
You will explore adversary emulation techniques, gaining insight into the tools commonly used in these exercises and the essential technical controls to implement when simulating the behaviors of advanced attackers.

Application Exploitation
You will learn how integrating threat modeling with the software development lifecycle, implementing patch management strategies, and applying exploit mitigation techniques can significantly strengthen an organization’s defenses against application-based vulnerabilities.

Data Exfiltration
You will examine various strategies for data exfiltration, the challenges of detecting C2 (Command and Control) channels, and the potential benefits and limitations of deploying deception techniques to disrupt data theft efforts.

Installation
You will review common persistence strategies that adversaries use to maintain access and learn how to protect against these techniques by implementing robust detection and prevention measures.

Lateral Movement
You will analyze different lateral movement techniques used by attackers to expand their reach within a network, and discover defensive strategies and controls to detect and stop the movement of malicious payloads across systems.

Payload Delivery
You will assess different methods for delivering malicious payloads and explore defensive tactics and technologies to reduce the risk of successful delivery, helping to secure endpoints and prevent unauthorized access.

Payload Execution
You will evaluate various techniques for executing payloads within a compromised network, focusing on detection strategies and control mechanisms to block or mitigate the execution of malicious code.

Reconnaissance, Threat Handling, and Incident Response
You will gain expertise in the critical phases of reconnaissance, threat hunting, and incident response, learning how these practices contribute to identifying potential threats early and responding effectively to mitigate damage from adversary activities.

There are no formal prerequisites for this course. However, it is recommended that you have the following knowledge and experience: Experience with Linux and Windows command line (including PowerShell) Familiarity with Windows Active Directory concepts A foundational understanding of cybersecurity topics A strong grasp of TCP/IP and networking concepts

proctored exam 75 questions 2 hours Minimum passing score of 70%

Following your booking, a confirmation message will be sent to all participants, ensuring you're well-informed of your successful enrollment. Calendar placeholders will also be dispatched to assist you in scheduling your commitments around the course. Rest assured, all course materials and access to necessary labs or platforms will be provided no later than one week before the course begins, allowing you ample time to prepare and engage fully with the learning experience ahead.

Our comprehensive training package includes all the necessary materials and resources to facilitate a full learning experience. Enrollees will be provided with detailed course content, encompassing a wide array of topics to ensure a thorough understanding of the subject matter. Additionally, participants will receive a certificate of completion to recognize their dedication and hard work. It's important to note that while the course fee covers all training materials and experiences, the examination fee for certification is not included but can be purchased separately.

Questions About This Course?