YoVDO

Assessing Red Team Post Exploitation Activity

Offered By: Pluralsight

Tags

Red Team Courses Cybersecurity Courses Penetration Testing Courses Threat Detection Courses Insider Threats Courses

Course Description

Overview

In this course, you will explore the mindset and techniques used by red team operators and common cyber adversaries, and the ways the defensive teams can detect and even get ahead of these malicious actions.

Attackers can use some sophisticated and unsophisticated means to slip by external defenses and detections. Insider threat is on the rise and completely bypasses network or remote access inspection and authentication. As a pen-test progresses from the initial access phase into post-exploitation activity, you aim to understand what is being accomplished inside the network and how your internal defenses can accomplish a defense in depth posture. You ask the assessment team to explain not only what steps they are taking to operate inside your already compromised network but also how you can mitigate these capabilities in the future.

Syllabus

  • Course Overview 1min
  • Introduction 0mins
  • Why You Missed Initial Access 8mins
  • Internal Enumeration 19mins
  • Transmitting Laterally 12mins
  • Taking Action on Objective 14mins
  • Wrap Up 4mins

Taught by

Aaron Rosenmund

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network