Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Locked Assessing Red Team Post Exploitation Activity


itsMe

Recommended Posts

This is the hidden content, please

About Course

In this course, you will explore the mindset and techniques used by red team operators and common cyber adversaries, and the ways the defensive teams can detect and even get ahead of these malicious actions.

What you’ll learn

Attackers can use some sophisticated and unsophisticated means to slip by external defenses and detections. Insider threat is on the rise and completely bypasses network or remote access inspection and authentication. As a pen-test progresses from the initial access phase into post-exploitation activity, you aim to understand what is being accomplished inside the network and how your internal defenses can accomplish a defense in depth posture. You ask the assessment team to explain not only what steps they are taking to operate inside your already compromised network but also how you can mitigate these capabilities in the future.

This is the hidden content, please

This is the hidden content, please

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.