YoVDO

Adversary Emulation with Caldera - Red Team Series

Offered By: Linode via YouTube

Tags

Red Team Courses Penetration Testing Courses Privilege Escalation Courses Adversary Emulation Courses

Course Description

Overview

Dive into the world of adversary emulation with this comprehensive video tutorial on using Caldera, a cybersecurity framework built on the MITRE ATT&CK™ model. Learn the fundamentals of red teaming, understand the differences between red teaming and penetration testing, and explore the concept of adversary emulation. Gain hands-on experience configuring Caldera, deploying agents, creating adversary profiles, and conducting operations. Examine privilege escalation tactics, utilize various adversarial methods, and discover how to enumerate manually. Explore reporting features and available plugins to enhance your red team capabilities. By the end of this 1 hour 37 minute guide, you'll have a solid foundation in using Caldera for automated adversary emulation and manual red team exercises.

Syllabus

Introduction
What We’ll Be Covering
Prerequisites
Let’s Get Started
What is Red Teaming
Red Teaming vs Pentesting
What is Adversary Emulation
Red Team Kill Chain
What is MITRE Attack
What is Caldera?
Caldera Terminology
Practical Aspect
What is the Mitre Attack Framework?
Configuring Caldera
Accessing the Caldera Server
Adding Hosts as Agents
Deploying an Agent
Evaluating Adversaries
Creating an Adversary Profile
Caldera Operations
Examining Privilege Escalation Tactics
Creating an Adversary Profile
Checking on our Agents
Using other Adversarial Methods
Creating Another Adversary Profile
Running Our Adversary Profile
Enumerating Manually
Reporting Overview
Plugin Overview
Quick Recap


Taught by

Linode

Related Courses

The RedTeam Blueprint - A Unique Guide To Ethical Hacking
Udemy
Red Team Ethical Hacking - Beginner
Udemy
Active Directory Pentesting Full Course - Red Team Hacking
Udemy
Active Directory Pentesting With Kali Linux - Red Team
Udemy
Red Team Tools for Emulated Adversary Techniques with MITRE ATT&CK
Pluralsight