Red Team Yourself - Thomas Richards
Offered By: YouTube
Course Description
Overview
Explore the concept of Red Teaming in information security through this GrrCON 2017 conference talk. Learn about the purpose and benefits of Red Teaming, its basic elements including electronic, social, and physical aspects, and how to build an in-house Red Team. Discover the dynamics of a Red Team, including leadership roles and assessor responsibilities, while addressing common challenges and pitfalls. Gain insights into creating a Red Team runbook, conducting reconnaissance, attack planning, and post-exploitation techniques. Develop a comprehensive understanding of adversary emulation and how to effectively "Red Team Yourself" to improve organizational security posture.
Syllabus
Intro
About me
Question for the audience
Purpose of this Talk
What is Red Teaming?
Red Teaming in the InfoSec Context
Why Red Team
Not a Bug Hunt
Adversary Emulation
Know Yourself
Basic Elements of a Red Team Assessment
Electronic
Social
Physical
Building an In-House Red Team
Placing the Red Team
Red Team Dynamic - Leader
Red Team Dynamic - Assessors
Getting Managerial Support
Common Push Backs
Common Pit Falls
Red Team Runbook
Reconnaissance
Passive Recon Examples
Active Recon Examples
Attack Planning
Post-Exploitation
Having a Big Bag of Tricks
Putting it all together
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network