The training is divided in five sections: Initial foothold, Gaining access, Offensive Coding, internal reconnaissance and lateral movement. The training will cover each section in depth by providing technical evidence of how each technique works. Red team exercises are performed to assess responsiveness and detection capability. As a red teamer, it is important to understand what each tool and commands we use is doing behind the curtain to be able to provide proper guidance. The training will help you understand the tool and technique being used during a red team, develop your own toolset, adapt existing tools when needed, provide guidance on where to look for new techniques or potential evasion tricks and finally an overview of the popular technique used to perform red team exercise.

Expect to perform code review, network analysis, code behavior analysis and write code to improve your red team capabilities.

Syllabus

Initial foothold

Payload Crafting

Gaining access

Internal reconnaissance

Lateral Movement

Mr.Un1k0d3r – Red Team Training

ادامه مطلب

The Mr.Un1k0d3r – Offensive Coding is a comprehensive program designed for those interested in the field of cybersecurity, particularly in offensive security and penetration testing. The course is led by Mr.Un1k0d3r, who is known for developing Red Team tools.

One of the key aspects of this course is its focus on AV/EDR Evasion: Packer Style. This involves learning about various techniques to evade antivirus and endpoint detection and response systems, which are crucial skills for any offensive security professional.

The course also includes a detailed walkthrough of the Prelude Operator 1.5 platform. This platform is used extensively in the course to demonstrate and practice various offensive coding techniques.

Mr.Un1k0d3r – Offensive Coding

ادامه مطلب

The SentinelOne Singularity Administration course provides comprehensive training for cybersecurity professionals. Whether you’re a seasoned system administrator or a novice threat hunter, this course caters to various roles and experience levels. Here are the key highlights:

  1. Singularity Platform & Policy Administration: Learn how to manage and configure SentinelOne’s Singularity platform, including policy administration and customization.
  2. Incident Response: Dive into effective incident response strategies using SentinelOne. Understand how to handle security incidents and mitigate threats swiftly.
  3. Ranger for Network Discovery & Attack Surface Management: Explore Ranger, a powerful tool for network discovery and managing attack surfaces. Enhance your threat detection capabilities.
  4. Threat Hunting: Develop skills in proactive threat hunting. Discover advanced techniques to identify and neutralize threats before they escalate.

SentinelOne Singularity Administration

ادامه مطلب

The SentinelOne University Singularity Foundations course is designed to empower cybersecurity professionals with essential knowledge and skills related to the SentinelOne Singularity platform. Whether you’re a system administrator, an IT operations specialist, or a security analyst, this course provides a solid foundation for understanding and effectively utilizing SentinelOne’s cutting-edge security technology.

ادامه مطلب

The SentinelOne University Incident Response course provides participants with the knowledge and skills necessary to effectively use the SentinelOne platform for identifying and responding to incidents. Whether you’re a seasoned incident responder or just starting out, this course equips you with actionable insights and practical techniques.

ادامه مطلب

SentinelOne University offers cybersecurity training programs, including a comprehensive Threat Hunting course. Whether you’re a system administrator seeking to enhance your skills or a seasoned threat hunter looking to expand your toolkit, this course has actionable and insightful content for every role and experience level.

Here are the key highlights of the SentinelOne University Threat Hunting course:

    • The course focuses on repeatable and documentable cyber threat hunting methodologies.
    • Participants will learn about various tools that enhance the effectiveness of threat hunting.

Whether you’re diving into threat hunting for the first time or refining your expertise, SentinelOne University provides the resources you need to stay ahead in the ever-evolving cybersecurity landscape. 🛡️🔍

SentinelOne – Threat Hunting

ادامه مطلب