Home Specialist skills Security SEC564: Red Team Operations and Adversary Emulation
SEC564: Red Team Operations and Adversary Emulation
-
Consume threat intelligence and plan a Red Team engagement
-
Know how to set up the required infrastructure to have a successful operation taking into account operational security
-
Enumerate and extract valuable data required to achieve your objectives using automated tooling, but also manually, if required
-
Elevate privileges using a variety of attack vectors and misconfigurations that you will now be able to identify
Overview
Off the shelf (OTS)
In SEC565, students will learn how to plan and execute end to end Red Teaming engagements that leverage adversary emulation, including the skills to organise a Red Team, consume threat intelligence to map against adversary tactics, techniques, and procedures (TTPs), emulate those TTPs, report and analyse the results of the Red Team engagement and ultimately improve the overall security posture of the organisation.
As part of the course, students will perform an adversary emulation against a target organisation modelled on an enterprise environment, including Active Directory, intelligence-rich emails, file servers and endpoints running in Windows and Linux.
Delivery method
Digital
Course duration
42 hours
Competency level
Working