Course Summary
In this course, you will learn how to effectively plan and execute full-scale Red Team engagements through adversary emulation. You will gain the skills needed to organize and coordinate a Red Team, use threat intelligence to map adversary tactics, techniques, and procedures (TTPs), and emulate those TTPs to assess your organization’s security. You will also learn how to analyze and report on the results of your Red Team activities to enhance your organization’s defenses. Throughout the course, you will conduct an adversary emulation against a simulated enterprise environment, including Active Directory, targeted emails, file servers, and Windows-based endpoints.
Develop an adversary emulation plan based on gathered threat intelligence
Set up a comprehensive attack infrastructure
Conduct reconnaissance on the target environment
Gain initial access to systems and networks
Perform network and Active Directory enumeration
Move laterally through the network
Execute Active Directory-based attacks
Bypass common security defenses and evasion techniques
Collect and exfiltrate sensitive data
Compile an engagement report with findings and recommendations
Present Red Team activities and results to key stakeholders
Perform retesting and replay Red Team tactics for validation and improvement
Adversary Emulation Fundamentals
You will gain an understanding of key terminology, frameworks, and methodologies related to adversary emulation.
Attacking Active Directory
You will learn about Active Directory objects, the various authentication methods within an Active Directory environment, and the techniques used to exploit those authentication mechanisms.
Command and Control Infrastructure
You will understand how to deploy and use command-and-control infrastructure, including tools like Empire and Cobalt Strike, as well as how to establish and manage communication channels.
Creating the Attack Infrastructure
You will learn how to build and manage adversary infrastructures, including creating an adversary domain, DNS, and understanding techniques for redirection and pivoting within the network.
Discovery and Enumeration
You will develop skills for conducting network and Active Directory discovery and enumeration, as well as how to acquire credentials within the target environment.
Enumerating and Attacking Privileges
You will learn how to assess privileges within the environment and escalate to the necessary levels to achieve your objectives, including techniques for attacking Linux systems and performing privilege escalation remotely.
Gaining Access
You will understand how to conduct reconnaissance on a target, create and test malicious payloads, and deliver those payloads to gain access to the target environment.
Leveraging the Domain
You will gain the knowledge needed to move through the target environment, navigating within it to fulfill the objectives of the engagement.
Persistence and Exfiltration
You will learn various methods to establish persistence in an environment and how to exploit this access to complete engagement objectives, such as gaining access to databases, staging data for exfiltration, and simulating ransomware attacks.
Red Team Engagement Planning and Reporting
You will develop the ability to plan a Red Team engagement, including tasks such as adversary profiling, scoping the engagement, and organizing the Red Team. You will also learn how to close the engagement, including consolidating data, reporting actions taken by the Red Team, creating an engagement report, and determining whether retesting is required.
Other Popular Courses
CompTIA: SecurityX
- Duration: 5 Days
- Language: English
- Level: Advanced
- Exam: CAS-005
Executive Cyber Risk Certification (ECRC)
- Duration: 2 Days
- Language: English
- Level: Advanced
- Exam: ECRC
Mastering Communication & Presentation Te...
- Duration: 5 Days
- Language: Danish
- Level: Intermediate
- Exam: MCPT