Trending Courses
Vendors
Agile & Scrum
POPULAR COURSES
Read More In Blog
#BeCyberSmart with Microsoft: Cybersecurity Awareness Month 2024
AI & Machine Learning
Analytics & Data Management
Big Data
Business Application
Cloud Computing
Cyber Security
Database Admin & Dev
Data Engineering & Science
DevOps
Digital Transformation
IT Governance
IT Infrastructure
IT Service Management
Networking
Programming & Development
Project Management
Virtualization
Overview
The CRTP: Certified Red Team Professional course focuses on “offense-in-depth”, the ability to rapidly adapt to defensive mitigations and responses with a variety of offensive tactics and techniques.
CRTP immerses students in a single simulated enterprise environment, with multiple VMs, up-to-date and patched operating systems, and defenses. In keeping with the assumed breach mentality, the course provides detailed attacker tradecraft post initial access, which includes performing host situational awareness and “safety checks”, escalation privileges locally, breaking out of the beachhead, performing advanced lateral movement, escalating in Active Directory, performing advanced Kerberos attacks, and achieving red team objectives via data mining and exfiltration.
The course is fast paced and highly intensive, teaching delegates an in-depth methodology and approach while operating as a professional Red Teamer. We not only show delegates how to perform advanced red team tactics, techniques and procedures (TTP’s) but further cover how to run a successful end-to-end engagement with a focus on operational security and risk.
Coming Soon...
Module 1: Introduction to Red Teaming and Understanding of Attack DNA
Module 2: Host Exploitation : Windows & Linux
Host Exploitation on Windows and Linux Operation systems with the following red teaming steps and tons of scenario based hands-on exercises:
35 Hands-on Exercises on the following 4 Real world scenarios without any automated exploitation tools:
Module 3: Active Directory Exploitation
Most enterprise networks today are managed using Windows Active Directory and identity based exploitation is the low hanging fruit for hackers to gain access on the servers and to perform lateral movement and exfiltrate data from critical systems as we have seen in many high profile incidents in ASEAN like SingHealth. This module simulate real world attack with a non admin user account in the domain and how hackers work their way up to become an enterprise admin. The focus is on exploiting the variety of overlooked domain features and not just software vulnerabilities and to establish that a single machine compromise in a AD environment is enough for an entire organisational compromise
Following 9 Hands-on Lab Cover AD enumeration, trusts mapping, domain privilege escalation, domain persistence, Kerberos based attacks (Golden ticket), ACL issues, SQL server trusts, Defenses and bypasses of defenses:
Level-up by partnering with Trainocate. Get in touch today.