If you’ve been penetration testing and want to move up to red teaming, then this training course is for you. With a strong offensive focus drawing on the techniques employed in recent industry hacks, you’ll be taught about new vulnerabilities (current year – 3 years) and how to use them to their full potential.
It is often said that penetration testers emulate other penetration testers rather than real threat actors, leaving organisations exposed to what they miss. This course aims to change that. By combining our red teaming experience with two decades of teaching experience, we’ve put together a course to teach you how to test your organisations like a real criminal would; getting Domain Admin isn’t the goal.
This course covers some of our unique red teaming approaches including; a repeatable methodology for AV and EDR bypasses, a focus on business system compromise with a fully functional SWIFT environment, as well as newer technologies such as Kubernetes. You’ll be exposed to the techniques, tactics and procedures actively used in red team engagements by our analysts. Learn TTPs from industry experts and take away practical experience of doing it yourself.
SensePost has been conducting penetration tests against web applications for nearly two decades and has distilled its approach into this course. SensePost is the specialist pen testing arm of Orange Cyberdefense.
Our red team experience in going after critical business systems, from cross-border financial systems to large SCADA systems and the paths and techniques to get there are distilled into this course and taught by our active senior analysts. You’ll be exposed to actions on objectives and have the opportunity to hack some financial systems. Let’s become billionaires!
What students will be provided with:
A laptop that is capable of running an OpenVPN client, an SSH client and a Remote Desktop client.