COURSE OBJECTIVE:
After completing this course you should be able to:
• Analyze emerging trends in attacks
• Identify areas of vulnerability within your organization
• Prepare a risk assessment for your organization
• Report and recommend countermeasures
• Develop a threat management plan for your organization
• Organize Red Team – Blue Team exercises
TARGET AUDIENCE:
Red team and blue team members, enterprise administrators, infrastructure architects, security professionals, systems engineers, network administrators, IT professionals, security consultants and other people responsible for implementing network and perimeter security.
COURSE PREREQUISITES:
Attendees should meet the following prerequisites:
• Good hands-on experience in administering Windows infrastructure.
• At least 8 years in the field is recommended.
COURSE CONTENT:
Module 1: Identifying Areas of Vulnerability
• Defining the assets which your company needs to protect
• Defining the other sensitive information that needs to be protected
Module 2: Modern Attack Techniques
• OS platform threats and attacks
• Web based threats and attacks
• E-mail threats and attacks
• Physical access threats and attacks
• Social threats and attacks
• Wireless threats and attacks
Module 3: Reconnaissance
• Open Source Intelligence (OSINT)
• Google hacking
• Social Media presence
• DNS 5. Shodan
• Physical reconnaissance
• Port scanning
• Service discovery
• SIEM
• Intrusion Prevention Systems
Module 4: Weaponization
• Generating malicious payload
• Hiding malicious content in Office Suite documents
• Reverse shells
• Metasploit
• Empire
• AV evasion techniques
Module 5: Delivery
• Building phishing campaign
• Planting malicious device
• Attacks on 3rd parties
• Enabling phishing protection
• O365 / Safe links
• Smart Screen
• Secure proxy
• Sinkholing
• APT campaigns
Module 6: Exploitation and Installation
• Types of vulnerabilities
• Establishing foothold
• Stage-less and staged payloads / C&C
• Anti-Virus
• Firewall
• Application Whitelisting
• WDAC
• Living Off the Land Binaries
• Exploit Guard
• AMSI
Module 7: Privilege escalation
• Privileged accounts
• System services security
• Common misconfigurations
• Security tokens
• Just Enough Administration
• Patch maintenance
Module 8: Lateral movement
• Credential harvesting
• Mimikatz
• Network reconnaissance
• Building network map
• Responder
• Pass-the-hash
• Pass-the-ticket
• Credential Guard
• LAPS
• GPO policies
• Windows ATA
• Defender ATP
Module 9: Persistency
• Sleeping agents
• Piggybacking on network packets
• Rootkits
• Sysinternals
• Searching for rogue servers
• Looking for network anomalies
FOLLOW ON COURSES:
Not available. Please contact.