Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



 10005

[FREE] CRTO I and II - Red Team Ops lessons by Zero-Point Security

by Tamarisk - 27 September, 2023 - 11:41 AM
This post is by a banned member (tmpusrkiller) - Unhide
23
Posts
0
Threads
1 Year of service
Thanks
This post is by a banned member (anonieng) - Unhide
anonieng  
Registered
18
Posts
0
Threads
(27 September, 2023 - 11:41 AM)Tamarisk Wrote: Show More
MonkahRed Team Ops is an online, self-study course that teaches the basic principles, tools and techniques synonymous with red teaming.
Students will first cover the core concepts of adversary simulation, command & control, engagement planning and reporting.
They will then go through each stage of the attack lifecycle - from initial compromise to full domain takeover, data hunting and exfiltration. Students will learn how common "OPSEC failures" can lead to detection by defenders, and how to carry out those attacks in a stealthier way.
Finally, they will learn how to bypass defences such as Windows Defender, AMSI and AppLocker.

I share with you both version I and II of the training materials, so you can start with the basics and learn at your own pace.

[Image: sheepe.gif] [Image: sheepe.gif] [Image: hackerman_xmas.gif] Monkah Monkah Monkah [Image: hackerman_xmas.gif] [Image: hackerman_xmas.gif] [Image: clown2.gif] [Image: clown2.gif] [Image: clown2.gif] [Image: clown2.gif] [Image: hype.png]
This post is by a banned member (Nicolassnow) - Unhide
96
Posts
0
Threads
3 Years of service
Thank you
This post is by a banned member (blackjinks) - Unhide
54
Posts
0
Threads
gg
This post is by a banned member (hades1313) - Unhide
hades1313  
Registered
16
Posts
0
Threads
(27 September, 2023 - 11:41 AM)Tamarisk Wrote: Show More
Red Team Ops is an online, self-study course that teaches the basic principles, tools and techniques synonymous with red teaming.
Students will first cover the core concepts of adversary simulation, command & control, engagement planning and reporting.
They will then go through each stage of the attack lifecycle - from initial compromise to full domain takeover, data hunting and exfiltration. Students will learn how common "OPSEC failures" can lead to detection by defenders, and how to carry out those attacks in a stealthier way.
Finally, they will learn how to bypass defences such as Windows Defender, AMSI and AppLocker.

I share with you both version I and II of the training materials, so you can start with the basics and learn at your own pace.

thanks

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 3 Guest(s)