Search the Community
Showing results for tags 'operations'.
-
This is our premier, advanced red teaming course. We've previously taught this content at BlackHat, BSides and 44Con. This course is recommended for intermediate level students, since it's very lab-heavy. Course: Intrusion Operations by FortyNorth: 01 - Introduction 02 - C2 Options 03 - C2 Configuration - Part 1 04 - OSINT 05 - Active Recon 06 - Phishing 07 - Antivirus Evasion 08 - EDR Evasion Overview 09 - C2 Configuration - Part 2 10 - Initial Access, Recon, and Lateral Movement 11 - Persistence 12 - Application Whitelisting 13 - Aggressor Scripting 14 - Attacking the Cloud 15 - Finalizing the Test [Hidden Content] [hide][Hidden Content]]
-
- intrusion
- operations
-
(and 1 more)
Tagged with:
-
Learn how to write phishing malware and harvest credentials for gaining initial access into your target's environment. This course is recommended for students with an intermediate knowledge of programming. Course: Initial Access Operations by FortyNorth (PDF + video): 01 - Introduction 02 - Dev Environment Goals 03 - Cred Harvesting 04 - Docx Remote Template Injection 05 - Code Execution 06 - Code Execution Deep Dive 07 - XLM Macros 08 - Code Protections [Hidden Content] [hide][Hidden Content]]
-
- 1
-
- operations
- access
-
(and 2 more)
Tagged with:
-
(PDF + Videos) Learn the foundations of cybersecurity defense with Foundational Security Operations and Defensive Analysis (SOC-200), a course designed for job roles such as Security Operations Center (SOC) Analysts and Threat Hunters. Learners gain hands-on experience with a SIEM, identifying and assessing a variety of live, end-to-end attacks against a number of different network architectures. Learners who complete the course and pass the exam earn the OffSec Defence Analyst (OSDA) certification, demonstrating their ability to detect and assess security incidents. [Hidden Content] [hide][Hidden Content]]