Understanding how our adversaries accomplish high-profile attacks is
the cornerstone of this COURSE. The COURSE IS FOUNDED IN REALISTIC
ATTACK TACTICS AND TECHNIQUES THAT CAN BE FOUND IN OPEN SOURCE,
industry threat reports on nation state attributed adversaries. This
COURSE LEVERAGES THE SAME METHODOLOGY OUR MILLENNIUM RED TEAM
OPERATORS UTILIZE AND COVERS THE SAME TOPICS WE INSTILL IN ALL OF OUR
NEW RED TEAM OPERATORS, to prepare them for their career in emulating
nation-state level cyber threats.This course follows an attack
methodology that mimics the structure of nation state actors.
Utilizing individually assigned training environments, each student is
tasked with conducting their own red team operation against a
simulated, Windows domain network. Students spend the first 5 days in
a guided, hands-on lab driven network attack scenario. Following this,
students have the option of attempting a 1 day, follow on practical
certification exam to test their knowledge gained in the course.
The 5 day course will cover the following topics:
* Course Foundations
* Introduction to Red Teaming
* Red Team Methodology
* Mission Preparation
* Open Source Intelligence (OSINT) Collection and Analysis
* Active Reconnaissance
* Target Exploitation
* Post Exploitation activities
* Accomplishment of Mission Objectives
business
courses
collecting
culture
sports
1480
Views
28/04/2019 Last update