Introduction To Red Teaming
- Stages of Exploitation
- Payload Preparation
- Evasion and Bypass Techniques
- Maintaining Access
- Lateral Movement
- Data Exfiltration
If you've been penetration testing and want to move up to red teaming, then this course is for you.
It is often said that penetration testers emulate other penetration testers rather than real threat actors, leaving organisations exposed to what they miss. This course aims to change that. By combining our red teaming experience with two decades of teaching experience, we've put together a course to teach you how to test your organisations like a real criminal would; getting Domain Admin isn't the goal.
This course covers some of our unique red teaming approaches including; a repeatable methodology for AV and EDR bypasses, a focus on business system compromise with a fully functional SWIFT environment, as well as newer technologies such as Kubernetes.
You'll be exposed to the techniques, tactics and procedures actively used in red team engagements by our analysts.
With a strong offensive focus drawing on the techniques employed in recent industry hacks, you'll be taught about new vulnerabilities (current year - 3 years) and how to use them to their full potentia
Our training is delivered via SensePost, the specialist ethical hacking team of Orange Cyberdefense. SensePost have trained thousands of students on the art of network and application exploitation for the past decade. It's safe to say we enjoy teaching others how to own networks and applications. Our courses are developed from the work we perform for clients, so that you get a better understanding of how to exploit real-world scenarios. As one of Blackhat briefings longstanding training partners since 2002, our courses have taught thousands of students about the art of offensive and defensive approaches.
Who Should Take This Course:
Professionals having 2 year of pentesting experience and are familiar with Windows and Linux environments.
Students need to ensure they have the necessary level of skill. Extensive hacking experience is not required for this course, but a solid technical grounding is an absolute must.