Enterprise Security Control Attack Specialist

Course OverView:

  • AV, EDR (Windows & Linux), Directory-Level and Linux Controls Bypass
  • Offensive C# TradeCraft & Windows API Abuse
  • Multiple Cross-Forest Attacks in a hardened environment
  • Windows Features (AMSI, CLM, UAC, Applocker, WDAC, WDAG, WDEG, Sandbox) Bypass
  • Multiple Cross-Forest Attacks in a hardened environment
Enroll Now
product
  • 250+ PDF
    12+ Hours Videos
  • Security Control Setup
    Custom Automated Scripts
  • Healthcare Lab
    Enterprise Lab Access
  • Earn CESC-AS
    (Diamond, Gold)

Introduction:

Apex Threat Actors having advanced capabilities like leveraging in-memory implants, writing custom codes to evade AVs & EDR, moving laterally with custom made Tools, evading host and network level security solutions for stealthiness etc are constantly consolidating their attack techniques (and Tactics) against Defensive Teams.

Students will gain enough knowledge of the enterprise-grade security controls and how they can be stealthily evaded in Host-level, Network-level, Cloud-Level (EDR) and in a monitored Active Directory network having Health Care Simualtion. Class will go through TTPs, writing custom tookits in C#, abusing Windows internals / features and monitoring solutions, writing custom bypasses for evading host & network controls, bypassing cross-forest restrictions in AD Environment having Windows & Linux platforms in order to better refine detection in an enterprise.

Enterprise Security Controls Course Highlights:

Understand about Security Controls & Solutions
Offensive C# Tradecraft (easy & hard hands-on lab)
Abuse Windows API (easy & hard hands-on lab)
Learn Advanced Initial Access Technique
Abuse / Evade Security Controls (Host, Network, Cloud)
Active Directory with Windows & Linux environment
Leverage Monitoring & Patching Solutions
Play with EDR

Enterprise Security Controls Lab Highlights:

HealthCare Simulation Lab with multiple attack paths
Understand security controls architecture
Follow MITRE ATT&CK to evade monitoring / detection applications
Create & use custom tools in different scenarios
Windows & Linux based Active directory scenario
Learn advanced ways of Initial Access

Syllabus Highlights:

Enterprise Security Controls Lab is divided in to 5 main modules categorized below

Hands-on of Enterprise Security Controls:

  • Anti-Virus & End-Point Detection and Response (EDR)
  • End-Point Defender Features & EDR Introduction)
  • Directory-Level Controls & Linux Environment
  • Enterprise Environment Overview
  • Technologies Exploitation in Red Teaming

Implementation of Enterprise Security Controls:

  • Virtual Environment Setup & configuration
  • Host-Level Controls Setup
  • Network-Level Controls Setup
  • Linux Environment Setup

Offensive C# Tradecraft:

  • Virtual Environment Setup & configuration
  • CSharp Essentials & CSharp Beginner
  • Offensive C# Trade-Craft

Windows API:

  • Windows API Components
  • Windows API Essentials
  • Utilizing Windows API for Red Team Profit
  • Advanced AV Bypass Scenario

Abusing/Evading Host & Network based security controls:

  • Host-Level Security Controls
  • Network-Level Security Controls
  • EDR Bypass
  • Enterprise Grade Lab Environment
  • Scope of Engagement
  • Lab Solution / walkthrough in Video + PDF format
  • Preparing for Examination
 

Pre-Requisites:

Eagerness to learn Knowledge of Red Team Methodology Familiarity with Command Line

Certification Procedure:

To earn Enterprise Security Control Attack Control Specialist certificate, candidate must fulfill below criteria :

  • Appear in hands-on practical 24 hour examination
  • Candidate must share the detailed report within next 24 hours
  • Minimum passing score is 70%
 

Skills Reflected by Certificate Holder:

  • Architecting cyber attack simulation
  • Planning & executing an organized sophisticated attack
  • Leveraging in-memory implants & enterprise security solutions
  • Bypassing Security Controls deployed with Host& Network
  • Custom exploit writing based on variety of scenarios
  • Perform stealth operations under monitored or hardened environment
  • Bypassing AV, EDR & network-level restrictions
  • Utilizing "out-of-the-box" techniques to execute as organized adversaries

Copyright ©2021 CyberWarFare Labs. All Rights Reserved