SANS SEC565: Red Team Operations and Adversary Emulation (PDF/VoD)


SANS SEC565: Red Team Operations and Adversary Emulation (PDF/VoD)
English | Size: 4.72 GB
Genre: eLearning

Develop and improve Red Team operations for security controls in SEC565 through adversary emulation, cyber threat intelligence, Red Team tradecraft, and engagement planning. Learn how to execute consistent and repeatable Red Team engagements that are focused on the effectiveness of the people, processes, and technology used to defend environments.

What You Will Learn
Penetration testing is effective at enumerating vulnerabilities, but less effective in addressing personnel and processes on the defense side. This can leave Blue Teams or defenders without sufficient knowledge of what offensive input to improve, in turn leaving organizations stuck in a cyclical process of just focusing on vulnerabilities in systems rather than on maturing defenders to effectively detect and respond to attacks.

In SEC565, students will learn how to plan and execute end-to-end Red Teaming engagements that leverage adversary emulation, including the skills to organize a Red Team, consume threat intelligence to map against adversary tactics, techniques, and procedures (TTPs), emulate those TTPs, report and analyze the results of the Red Team engagement, and ultimately improve the overall security posture of the organization. As part of the course, students will perform an adversary emulation against a target organization modeled on an enterprise environment, including Active Directory, intelligence-rich emails, file servers, and endpoints running in Windows and Linux.

SEC565 features six intensive course sections. We will start by consuming cyber threat intelligence to identify and document an adversary that has the intent, opportunity, and capability to attack the target organization. Using this strong threat intelligence and proper planning, students will follow the Unified Kill Chain and multiple TTPs mapped to MITRE® ATT&CK™(Adversarial Tactics, Techniques, and Common Knowledge) during execution. During three course sections, students will be immersed in deeply technical Red Team tradecraft ranging from establishing resilient and advanced attack infrastructure to abusing Active Directory. After gaining initial access, students will thoroughly analyze each system, pilfer technical data and target intelligence, and then move laterally, escalating privileges, laying down persistence, and collecting and exfiltrating critically impactful sensitive data. The course concludes with an exercise analyzing the Blue Team response, reporting, and remediation planning and retesting.

In SEC565, you will learn how to show the value that Red Teaming and adversary emulations bring to an organization. The main job of a Red Team is to make a Blue Team better. Offense informs defense and defense informs offense. SEC565 develops Red Team operators capable of planning and executing consistent and repeatable engagements that are focused on training and on measuring the effectiveness of the people, processes, and technology used to defend environments.

You Will Be Able To:

Consume threat intelligence and plan a Red Team engagement
Set up the required infrastructure to have a successful operation taking into account operational security
Create weaponization that will allow you to infiltrate an organization
Enumerate and extract valuable data required to achieve your objectives using automated tooling, but also manually, if required
Move laterally and persist in a corporate network
Elevate privileges using a variety of attack vectors and misconfigurations that you will now be able to identify
Report your findings in a meaningful way to bring maximum value to your client

You Will Learn How To:

Use threat intelligence to study adversaries for emulation
Build an adversary emulation plan
Map actions to MITRE® ATT&CK™ to aid in communicating with the Blue Team
Establish resilient, advanced C2 infrastructure
Maintain operational security throughout an engagement
Leverage initial access to elevate and propagate through a network
Enumerate and attack Active Directory
Collect and exfiltrate sensitive data in a safe manner
Close an engagement, deliver value, and plan for retesting

rapidgator.net/file/3c1ebb09548ac4d97b9f98e84faa7726/SANS-565-Red-Team-Operations-and-Adversary-Emulation.part01.rar.html
rapidgator.net/file/f6e3c69d9bd8ddbb4e40b4684c6c4abb/SANS-565-Red-Team-Operations-and-Adversary-Emulation.part02.rar.html
rapidgator.net/file/5f4011dfd75ce6be72b5e163e49e0a1c/SANS-565-Red-Team-Operations-and-Adversary-Emulation.part03.rar.html
rapidgator.net/file/260118da9205d889bba3d9e5bc59180f/SANS-565-Red-Team-Operations-and-Adversary-Emulation.part04.rar.html
rapidgator.net/file/f16d5fc4ad280c70f87f0c8f51bc5ce0/SANS-565-Red-Team-Operations-and-Adversary-Emulation.part05.rar.html
rapidgator.net/file/8d6e5bc1c2465a595e73c6dbf7e8cb79/SANS-565-Red-Team-Operations-and-Adversary-Emulation.part06.rar.html
rapidgator.net/file/b2c5644fdadda80e07910394f4732e48/SANS-565-Red-Team-Operations-and-Adversary-Emulation.part07.rar.html
rapidgator.net/file/bb7cf3fd5ea449fb206863546fb5ebcd/SANS-565-Red-Team-Operations-and-Adversary-Emulation.part08.rar.html
rapidgator.net/file/4f57348a902d64d76b35d87ac5301342/SANS-565-Red-Team-Operations-and-Adversary-Emulation.part09.rar.html
rapidgator.net/file/a9686efce526285f3861a00921737b0d/SANS-565-Red-Team-Operations-and-Adversary-Emulation.part10.rar.html
rapidgator.net/file/e64aa80f8192764e3e3243e10647f8ea/SANS-565-Red-Team-Operations-and-Adversary-Emulation.part11.rar.html
rapidgator.net/file/5ac9a9578dc2c9d66d39d1c78b7f7166/SANS-565-Red-Team-Operations-and-Adversary-Emulation.part12.rar.html
rapidgator.net/file/19b72afcd35835640a884abdd5236b98/SANS-565-Red-Team-Operations-and-Adversary-Emulation.part13.rar.html

nitroflare.com/view/3D4266E7E40576B/SANS-565-Red-Team-Operations-and-Adversary-Emulation.part01.rar
nitroflare.com/view/963CA549ACF38A1/SANS-565-Red-Team-Operations-and-Adversary-Emulation.part02.rar
nitroflare.com/view/14FA593AC7812B6/SANS-565-Red-Team-Operations-and-Adversary-Emulation.part03.rar
nitroflare.com/view/E59372115213BAD/SANS-565-Red-Team-Operations-and-Adversary-Emulation.part04.rar
nitroflare.com/view/6A7483E7B6DEC97/SANS-565-Red-Team-Operations-and-Adversary-Emulation.part05.rar
nitroflare.com/view/706B0A58A1FE784/SANS-565-Red-Team-Operations-and-Adversary-Emulation.part06.rar
nitroflare.com/view/4D03A331B3C083C/SANS-565-Red-Team-Operations-and-Adversary-Emulation.part07.rar
nitroflare.com/view/544307BE52AA838/SANS-565-Red-Team-Operations-and-Adversary-Emulation.part08.rar
nitroflare.com/view/BBEB07A8B413C0E/SANS-565-Red-Team-Operations-and-Adversary-Emulation.part09.rar
nitroflare.com/view/1A17DF0258003EE/SANS-565-Red-Team-Operations-and-Adversary-Emulation.part10.rar
nitroflare.com/view/9BBFD65C131CB1C/SANS-565-Red-Team-Operations-and-Adversary-Emulation.part11.rar
nitroflare.com/view/917A4EE94037278/SANS-565-Red-Team-Operations-and-Adversary-Emulation.part12.rar
nitroflare.com/view/952B99AECB0A65E/SANS-565-Red-Team-Operations-and-Adversary-Emulation.part13.rar

Leave a Comment