Stealth Cyber Operator [CSCO]
- Red Team Resource Development [Infra Setup]
- Abuse improperly placed and mis-configured security controls in infrastructure
- Trade-craft development for Offensive Operations
- Resource abuse using Windows APIs, C, C++ & Csharp
- Utilizing Trade-craft for Red Teaming in Hardened Environment
- Leveraging Endpoint Security Controls (AV, EDR) & so much more…
Red Team Resource Development
- Enterprise Security Controls Architecture
- Bypassing / Circumventing Initial Access Defenses
- Red Team Infrastructure Development
- Initial Access by Abusing Enterprise Applications
- Custom scripts / code for Operational Security
Trade-craft Development for Offensive Operations
- Hands-on offensive trade-craft development (C# & Windows API)
- Fully Undetectable (FUD) payload creation strategies
- Understanding Microsoft & Linux Based Security Controls
- Defense Evasion Strategies for malware development
Utilizing Trade-craft for Red Teaming in Hardened Environment
- Microsoft based security controls defense evasion
- Circumventing Host & Network based security controls
- Interesting Cross Forest Trust abuse scenario
- Custom ways for credential access in windows & Linux boxes
- Real-World Engagement case scenarios
Blinding Endpoint Defenses [Explicit Edition]
- ETW & EDR Basics
- Deep Diving into endpoint security internals
- Evasion Strategies & Exercises
- FUD ETW & EDR Bypasses
- Enterprise Security Controls Lab Access
Syllabus
This link is hidden for visitors. Please Log in or register now.