SEC564 course is designed to immerse students in the tactics, techniques, and procedures (TTPs) used by modern adversaries. By understanding the mindset and strategies of attackers, participants will learn how to conduct sophisticated penetration tests, simulate real-world attacks, and assess the security posture of organizations from a threat actor’s perspective. This course covers advanced topics in threat emulation, including attack simulations, red team engagements, and developing countermeasures to thwart malicious activities. By the end of the course, students will be adept at identifying vulnerabilities, exploiting weaknesses, and enhancing overall security resilience.
ادامه مطلب

SEC460 is a comprehensive course designed to equip information security professionals with the skills necessary to effectively secure large-scale enterprise environments, including cloud infrastructures. The course focuses on building technical vulnerability assessment capabilities and introduces a holistic methodology tailored to address the challenges faced by organizations managing extensive systems.

ادامه مطلب

SEC583: Crafting Packets is a one-day, lab-intensive course designed to teach security analysts, network engineers, and system administrators the powerful skill of crafting and manipulating packets. This capability is essential for testing firewall policies, IDS/IPS rules, host/server settings, application configurations, and more.

ادامه مطلب

SEC579 is a comprehensive course designed to equip security professionals with the knowledge and skills necessary to secure virtualized and software-defined infrastructures. As organizations increasingly adopt virtualization technologies and software-defined networking (SDN) to enhance efficiency and scalability, they also face new security challenges. This course addresses these challenges by providing in-depth coverage of securing virtual environments and SDN architectures.

ادامه مطلب

SEC545 is a comprehensive course designed to equip security professionals with the knowledge and skills necessary to secure cloud infrastructures effectively. As organizations increasingly migrate to cloud environments, understanding how to design, implement, and manage security measures in these settings becomes crucial.

ادامه مطلب

So you popped a shell, now what? Windows Post Exploitation focuses on four major components of any adversary simulation or red team exercise: enumeration, persistence, privilege escalation, and lateral movement. Each of these steps will be covered in detail with hands-on labs in a custom Active Directory environment. In addition, students will learn several modern techniques to minimize opportunities for detection. This course goes beyond teaching popular tactics, techniques, and procedures. Instead, students will learn how to covertly gather and leverage information about a target environment to achieve their objectives efficiently. A review of each post-ex capability will include discussion on the OPSEC implications and publicly documented detection recommendations. Open-source SIEM rules from Sigma and Elastic will be used as a starting point for avoiding alert generation. No technique is undetectable; the key is understanding an environment’s detection capabilities and choosing the best course of action.

Antisyphon: Windows Post Exploitation w/ Kyle Avery

ادامه مطلب