YoVDO

Red Team Yourself - Thomas Richards

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Post Exploitation Courses Reconnaissance Courses Adversary Emulation Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the concept of Red Teaming in information security through this GrrCON 2017 conference talk. Learn about the purpose and benefits of Red Teaming, its basic elements including electronic, social, and physical aspects, and how to build an in-house Red Team. Discover the dynamics of a Red Team, including leadership roles and assessor responsibilities, while addressing common challenges and pitfalls. Gain insights into creating a Red Team runbook, conducting reconnaissance, attack planning, and post-exploitation techniques. Develop a comprehensive understanding of adversary emulation and how to effectively "Red Team Yourself" to improve organizational security posture.

Syllabus

Intro
About me
Question for the audience
Purpose of this Talk
What is Red Teaming?
Red Teaming in the InfoSec Context
Why Red Team
Not a Bug Hunt
Adversary Emulation
Know Yourself
Basic Elements of a Red Team Assessment
Electronic
Social
Physical
Building an In-House Red Team
Placing the Red Team
Red Team Dynamic - Leader
Red Team Dynamic - Assessors
Getting Managerial Support
Common Push Backs
Common Pit Falls
Red Team Runbook
Reconnaissance
Passive Recon Examples
Active Recon Examples
Attack Planning
Post-Exploitation
Having a Big Bag of Tricks
Putting it all together


Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube