Red Team Yourself - Thomas Richards
Offered By: YouTube
Course Description
Overview
Explore the concept of Red Teaming in information security through this GrrCON 2017 conference talk. Learn about the purpose and benefits of Red Teaming, its basic elements including electronic, social, and physical aspects, and how to build an in-house Red Team. Discover the dynamics of a Red Team, including leadership roles and assessor responsibilities, while addressing common challenges and pitfalls. Gain insights into creating a Red Team runbook, conducting reconnaissance, attack planning, and post-exploitation techniques. Develop a comprehensive understanding of adversary emulation and how to effectively "Red Team Yourself" to improve organizational security posture.
Syllabus
Intro
About me
Question for the audience
Purpose of this Talk
What is Red Teaming?
Red Teaming in the InfoSec Context
Why Red Team
Not a Bug Hunt
Adversary Emulation
Know Yourself
Basic Elements of a Red Team Assessment
Electronic
Social
Physical
Building an In-House Red Team
Placing the Red Team
Red Team Dynamic - Leader
Red Team Dynamic - Assessors
Getting Managerial Support
Common Push Backs
Common Pit Falls
Red Team Runbook
Reconnaissance
Passive Recon Examples
Active Recon Examples
Attack Planning
Post-Exploitation
Having a Big Bag of Tricks
Putting it all together
Related Courses
Building Geospatial Apps on Postgres, PostGIS, & Citus at Large ScaleMicrosoft via YouTube Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube What's New in Grails 2.0
ChariotSolutions via YouTube Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube