$2,299.00
Date | Day | Time | Duration |
27 Sept | Monday | 09:00 to 17:00 PST/CEST | 8 Hours |
28 Sept | Tuesday | 09:00 to 17:00 PST/CEST | 8 Hours |
It is often said that penetration testers emulate other penetration testers rather than real threat actors, leaving organisations exposed to what they miss. This course aims to change that. By combining our red teaming experience with two decades of teaching experience, we’ve put together a course to teach you how to test your organisations like a real criminal would; getting Domain Admin isn’t the goal.
This course covers some of our unique red teaming approaches including; a repeatable methodology for AV and EDR bypasses, a focus on business system compromise with a fully functional SWIFT environment, as well as newer technologies such as Kubernetes. You’ll be exposed to the techniques, tactics and procedures actively used in red team engagements by our analysts. Learn TTPs from industry experts and take away practical experience of doing it yourself.
SensePost has been conducting penetration tests against web applications for nearly two decades and has distilled its approach into this course. SensePost is the specialist pen testing arm of Orange Cyberdefense.
Our red team experience in going after critical business systems, from cross-border financial systems to large SCADA systems and the paths and techniques to get there are distilled into this course and taught by our active senior analysts. You’ll be exposed to actions on objectives and have the opportunity to hack some financial systems. Let’s become billionaires!
• Reconnaissance • Stages of Exploitation • Payloads and Preparation • Obtaining Foothold • Maintaining Access • AV and EDR Bypass • Attacking with Precision and Persistence • Actions On Objectives in Red Team Engagements • Data Exfiltration