Course Summary

In this course, you will learn how to effectively plan and execute full-scale Red Team engagements through adversary emulation. You will gain the skills needed to organize and coordinate a Red Team, use threat intelligence to map adversary tactics, techniques, and procedures (TTPs), and emulate those TTPs to assess your organization’s security. You will also learn how to analyze and report on the results of your Red Team activities to enhance your organization’s defenses. Throughout the course, you will conduct an adversary emulation against a simulated enterprise environment, including Active Directory, targeted emails, file servers, and Windows-based endpoints.

Develop an adversary emulation plan based on gathered threat intelligence
Set up a comprehensive attack infrastructure
Conduct reconnaissance on the target environment
Gain initial access to systems and networks
Perform network and Active Directory enumeration
Move laterally through the network
Execute Active Directory-based attacks
Bypass common security defenses and evasion techniques
Collect and exfiltrate sensitive data
Compile an engagement report with findings and recommendations
Present Red Team activities and results to key stakeholders
Perform retesting and replay Red Team tactics for validation and improvement

Adversary Emulation Fundamentals
You will gain an understanding of key terminology, frameworks, and methodologies related to adversary emulation.

Attacking Active Directory
You will learn about Active Directory objects, the various authentication methods within an Active Directory environment, and the techniques used to exploit those authentication mechanisms.

Command and Control Infrastructure
You will understand how to deploy and use command-and-control infrastructure, including tools like Empire and Cobalt Strike, as well as how to establish and manage communication channels.

Creating the Attack Infrastructure
You will learn how to build and manage adversary infrastructures, including creating an adversary domain, DNS, and understanding techniques for redirection and pivoting within the network.

Discovery and Enumeration
You will develop skills for conducting network and Active Directory discovery and enumeration, as well as how to acquire credentials within the target environment.

Enumerating and Attacking Privileges
You will learn how to assess privileges within the environment and escalate to the necessary levels to achieve your objectives, including techniques for attacking Linux systems and performing privilege escalation remotely.

Gaining Access
You will understand how to conduct reconnaissance on a target, create and test malicious payloads, and deliver those payloads to gain access to the target environment.

Leveraging the Domain
You will gain the knowledge needed to move through the target environment, navigating within it to fulfill the objectives of the engagement.

Persistence and Exfiltration
You will learn various methods to establish persistence in an environment and how to exploit this access to complete engagement objectives, such as gaining access to databases, staging data for exfiltration, and simulating ransomware attacks.

Red Team Engagement Planning and Reporting
You will develop the ability to plan a Red Team engagement, including tasks such as adversary profiling, scoping the engagement, and organizing the Red Team. You will also learn how to close the engagement, including consolidating data, reporting actions taken by the Red Team, creating an engagement report, and determining whether retesting is required.

There are no formal prerequisites for this course. However, a basic understanding of general penetration testing concepts and tools is recommended. Additionally, a background in security fundamentals will provide a strong foundation for learning Red Team concepts.

proctored exam 75 questions 2 hours Minimum passing score of 76%

Following your booking, a confirmation message will be sent to all participants, ensuring you're well-informed of your successful enrollment. Calendar placeholders will also be dispatched to assist you in scheduling your commitments around the course. Rest assured, all course materials and access to necessary labs or platforms will be provided no later than one week before the course begins, allowing you ample time to prepare and engage fully with the learning experience ahead.

Our comprehensive training package includes all the necessary materials and resources to facilitate a full learning experience. Enrollees will be provided with detailed course content, encompassing a wide array of topics to ensure a thorough understanding of the subject matter. Additionally, participants will receive a certificate of completion to recognize their dedication and hard work. It's important to note that while the course fee covers all training materials and experiences, the examination fee for certification is not included but can be purchased separately.

Questions About This Course?