Learn the core components of a red team engagement, from threat intelligence to OPSEC and C2s. This module will introduce the core components and structure of a red team engagement. You will learn how to apply threat intelligence to red team engagements, utilize operations security processes, and set up your own command and control server. By the end of the module, you will be able to plan a red team engagement and understand the methodologies used to emulate a real threat actor.
Learn about the basics of a red engagement, the main components and stakeholders involved, and how red teaming differs from other cyber security engagements.
Learn the steps and procedures of a red team engagement, including planning, frameworks, and documentation.
Apply threat intelligence to red team engagements and adversary emulation.
Learn the steps and procedures of a red team engagement, including planning, frameworks, and documentation.
Hacking Windows is often daunting. Grasp the fundamentals of core Windows concepts.
A learning pathway is made up of modules, and a module is made of bite-sized rooms (think of a room like a mini security lab).