Adversarial Emulation
Offered By: YouTube
Course Description
Overview
Explore adversarial emulation techniques in this 47-minute conference talk from Derbycon 2019. Delve into key concepts presented by Bryson Bort, covering communication protocols, the evolution of red teams, defense validation, and the distinctions between emulation and simulation. Learn about open-source options, PowerShell applications, ransomware tactics, networking activities, and lateral movement strategies. Gain insights into the people behind today's red teams and understand the goals of effective adversarial emulation in cybersecurity.
Syllabus
Introduction
Concept
Bryson
Communication Protocols
The People
Todays Red Team
What Do We Want
Defense Validation
Emulation vs Emulation
Good and Bad
Open Source Options
PowerShell
Ransomware
Networking activities
Lateral movement
Related Courses
Cyber Security Foundations: Common Malware Attacks and Defense StrategiesEC-Council via FutureLearn Cybersecurity Foundations
LinkedIn Learning The Cybersecurity Threat Landscape
LinkedIn Learning A Guide to Ransomware Protection
Udemy Ciberseguridad. Bases y estructuras para la protección de la información
Universidad Anáhuac via edX