(3 months ago)Sauron Wrote:
The courses contents are divided across 4 sections listed below:
Red Team Resource Development- Enterprise Security Controls Architecture
- Bypassing / Circumventing Initial Access Defenses
- Red Team Infrastructure Development
- Initial Access by Abusing Enterprise Applications
- Custom scripts / code for Operational Security
Trade-craft Development for Offensive Operations- Hands-on offensive trade-craft development (C# & Windows API)
- Fully Undetectable (FUD) payload creation strategies
- Understanding Microsoft & Linux Based Security Controls
- Defense Evasion Strategies for malware development
Utilizing Trade-craft for Red Teaming in Hardened Environment- Microsoft based security controls defense evasion
- Circumventing Host & Network based security controls
- Interesting Cross Forest Trust abuse scenario
- Custom ways for credential access in windows & Linux boxes
- Real-World Engagement case scenarios
Blinding Endpoint Defenses [Explicit Edition]- ETW & EDR Basics
- Deep Diving into endpoint security internals
- Evasion Strategies & Exercises
- FUD ETW & EDR Bypasses
- Enterprise Security Controls Lab Access
thx