MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 ChGenre: eLearning | Language: English + srt | Duration: 84 lectures (4h 16m) | Size: 1.64 GB
Learn how to perform red team adversary emulation exercises end-to-end
How to plan and manage adversary emulation exercise
Difference between red teaming and adversary emulation
MITRE ATT&CK Framework
Red team operations attack lifecycle
How to conduct adversary emulation exercise on a live organization
Open Source Intelligence (OSINT) techniques to gather information
Weaponizing exploits to gain foothold into the network
Password brute-forcing using custom generated lists
Phishing an employee
Escalating Privileges on Linux and Windows systems
Active Directory enumeration using BloodHound
Active Directory attacks
Establishing persistence via PoshC2 (command and control center software)
Creating an engagement report
Basic knowledge of Kali Linux
Basic knowledge of PowerShell
Basic understanding of penetration testing and red teaming
Red Teamer mindset
Red Team Adversary Emulation, focuses on approaching an organization's security from the view of a real-world adversary.