YoVDO

Red Team Yourself - Thomas Richards

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Security Assessment Courses Reconnaissance Courses Adversary Emulation Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the fundamentals of red teaming in cybersecurity through this 46-minute conference talk from BSides Philly 2016. Delve into the history and purpose of red teaming, understand its role in information security, and learn how to build an in-house red team. Discover the basic elements of a red team assessment, including electronic, social, and physical aspects. Gain insights on team dynamics, managerial support, common challenges, and pitfalls. Examine the red team runbook, covering reconnaissance techniques, attack planning, post-exploitation, and the importance of a diverse skill set. Learn how to effectively emulate adversaries and conduct comprehensive security assessments to strengthen your organization's defenses.

Syllabus

Intro
Question for the audience
Purpose of this Talk
What is Red Teaming?
History of Red Teaming
Red Teaming in the InfoSec Context
Why Red Team
Not a Bug Hunt
Adversary Emulation
Know Yourself
Basic Elements of a Red Team Assessment
Electronic
Social
Physical
Building an In-House Red Team
Placing the Red Team
Red Team Dynamic - Leader
Red Team Dynamic - Assessors
Getting Managerial Support
Common Push Backs
Common Pit Falls
Red Team Runbook
Reconnaissance
Passive Recon Examples
Active Recon Examples
Attack Planning
Post-Exploitation
Having a Big Bag of Tricks
Putting it all Together


Related Courses

MITRE ATT&CK Defenderā„¢ ATT&CKĀ® Adversary Emulation
Cybrary
Adversary Emulation with Caldera - Red Team Series
Linode via YouTube
CALDERA - Automating Adversary Emulation
Black Hat via YouTube
Test or Be Tested - Adversary Emulation with Atomic Red Team
RSA Conference via YouTube
Live Adversary Simulation - Red and Blue Team Tactics
RSA Conference via YouTube