Impact with Caldera
Offered By: Pluralsight
Course Description
Overview
Impact is the last step on a red team simulation, where adversaries cause disruption in the system to accomplish their objectives. In this course, you will learn impact using Caldera.
In a real-world attack, after accomplishing all their objectives, some threat actors perform impact actions to extort money from their clients or to obfuscate their traces. Those impact actions vary from shutting down systems all the way to destroying data. In this course, Impact with Caldera we will cover how to utilize the Caldera tool to perform some impact techniques in a red team environment. First, you’ll learn the basics about impact and how to use the Caldera tool. Next, you will use Caldera to remove access from some accounts to cause impact. Finally, you’ll learn how to shut down systems and destroy data using the Caldera tool. When you’re finished with this course, you’ll have the skills and knowledge to execute these techniques [Account Access Removal (T1531), System Shutdown (T1529), Data Destruction (T1485)] using Caldera. More importantly, knowing how these techniques can be used against you, will ultimately lend to your ability as an organization, or an individual, to detect and defend against specific attack vectors.
In a real-world attack, after accomplishing all their objectives, some threat actors perform impact actions to extort money from their clients or to obfuscate their traces. Those impact actions vary from shutting down systems all the way to destroying data. In this course, Impact with Caldera we will cover how to utilize the Caldera tool to perform some impact techniques in a red team environment. First, you’ll learn the basics about impact and how to use the Caldera tool. Next, you will use Caldera to remove access from some accounts to cause impact. Finally, you’ll learn how to shut down systems and destroy data using the Caldera tool. When you’re finished with this course, you’ll have the skills and knowledge to execute these techniques [Account Access Removal (T1531), System Shutdown (T1529), Data Destruction (T1485)] using Caldera. More importantly, knowing how these techniques can be used against you, will ultimately lend to your ability as an organization, or an individual, to detect and defend against specific attack vectors.
Syllabus
- Course Overview 1min
- Simulating Impact with Caldera 23mins
- Resources 1min
Taught by
Ricardo Reimao
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Proactive Computer Security
University of Colorado System via Coursera Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Hacker101
HackerOne via Independent CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent