YoVDO

Selecting the Right Tool(s) for Your Red Team Operation

Offered By: Pluralsight

Tags

Red Team Courses Cybersecurity Courses Reconnaissance Courses

Course Description

Overview

In this course, you’ll learn from Cyber-Security experts Dale Meredith and Aaron Rosenmund as they discuss the importance of choosing the right tool for your red team engagements, as well as their own favorite tools that they recommend to not only recon a target but obtaining access.

You have been hired to test the security of a given enterprise network systems and its assets. Choosing the right tool can make the difference between a successful engagement and a total fail. With our toolkit already assembled, we will identify, recommend, and decide on the best way forth, to emulate a real-life red team operation attack. Why? These actions will help ensure that exploits/weaknesses can be detected and prevented by the organization’s blue team.

Syllabus

  • Course Overview 1min
  • Introduction 0mins
  • Detail the Engagement 12mins
  • Gathering Information via Reconnaissance 28mins
  • Attain System Access 13mins
  • Exploit LAN Access 12mins
  • Expose Organizational Infrastructure via Other Means 17mins
  • Being Fluid with your Tool 3mins

Taught by

Aaron Rosenmund

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network