YoVDO

Red Team Yourself - Thomas Richards

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Post Exploitation Courses Reconnaissance Courses Adversary Emulation Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the concept of Red Teaming in information security through this GrrCON 2017 conference talk. Learn about the purpose and benefits of Red Teaming, its basic elements including electronic, social, and physical aspects, and how to build an in-house Red Team. Discover the dynamics of a Red Team, including leadership roles and assessor responsibilities, while addressing common challenges and pitfalls. Gain insights into creating a Red Team runbook, conducting reconnaissance, attack planning, and post-exploitation techniques. Develop a comprehensive understanding of adversary emulation and how to effectively "Red Team Yourself" to improve organizational security posture.

Syllabus

Intro
About me
Question for the audience
Purpose of this Talk
What is Red Teaming?
Red Teaming in the InfoSec Context
Why Red Team
Not a Bug Hunt
Adversary Emulation
Know Yourself
Basic Elements of a Red Team Assessment
Electronic
Social
Physical
Building an In-House Red Team
Placing the Red Team
Red Team Dynamic - Leader
Red Team Dynamic - Assessors
Getting Managerial Support
Common Push Backs
Common Pit Falls
Red Team Runbook
Reconnaissance
Passive Recon Examples
Active Recon Examples
Attack Planning
Post-Exploitation
Having a Big Bag of Tricks
Putting it all together


Related Courses

Penetration Testing - Post Exploitation
New York University (NYU) via edX
Metasploit Framework: Penetration Testing with Metasploit
Udemy
Metasploit
Cybrary
Armitage and Metasploit for Penetration Testing - From Information Collecting to Post Exploitation
CAE in Cybersecurity Community via YouTube
Advanced Phishing Tactics Beyond User Awareness
YouTube