دوره Altered Security – Certified Evasion Techniques Professional (CETP)

The Evasion lab (Certified Evasion Techniques Professional) is designed to equip information security professionals with the expertise needed to bypass defenses in modern enterprise environments. This course delves deep into the techniques and methodologies used to bypass endpoint countermeasures like EDRs. You will gain a comprehensive understanding of Windows internals, including the distinction between user-mode and kernel-mode components, also you will gain a comprehensive understanding of EDRs internals, and how telemetries are collected.

​Throughout the course, you will learn about Windows Internals, reversing EDRs, bypassing  Microsoft Defender for Endpoint (MDE), Elastic EDR, Sysmon weaponizing kernel exploits for defense evasion and bypassing security controls like Protected Processes (PP), Process Protection Light (PPL), Digital Signature Enforcement (DSE), Attack Surface Reduction (ASR) rules and incapacitating Event Tracing for Windows (ETW) telemetry and a lot more .

Syllabus

  1. Windows Internals
  2. EDR Internals
  3. Static Detection Bypass
  4. Initial Access Techniques
  5. Introduction to Windows Kernel Programming
  6. Road to Kernel
  7. EDR Killing
  8. Attack on EDR’s Kernel Callbacks
  9. Attack on ETW
  10. PP & PPL Bypass
  11. Extra Offensive Rootkit Techniques
  12. C2 Traffic Tunneling
  13. Block EDR’s Traffic
  14. ASR rules Bypass
  15. Attack on Sysmon
  16. UAC Bypass
  17. Anti-Analysis

Altered Security – Certified Evasion Techniques Professional (CETP)