Certified Red Team Analyst

Course OverView:

  • Fully Hands-on course for Beginners
  • Course is for anyone who are interested in Red Teaming, Offensive Information Security
  • Get Study materials including Practice Lab, Video and Manuals (PDF)
  • Understand the mindset & TTPs of the Adversaries
  • Course will definitely help in journey to become a Red Teamer
Enroll Now
product
  • Develop
    Red Team Skills
  • 24x7 Lab Access
    with Study Material( PDF + Video )
  • Instructions
    to Deploy Red Team Lab Locally
  • Badge + Certificate
    Red Team Analyst

Introduction:

CyberWarFare Labs Certified Red Team Analyst is a hands-on course, designed specifically for begineers having interest in Red Teaming, future Red Team enthusiasts and anyone who wants to breakthrough in Offensive Information Security. This course comes with study materials including Practice Lab, Video and Manuals (PDF), students learn and practice techniques with adversarial mindset.

The main aim of this course is to help students and employees to understand the mindset of the adversaries and scale the damage caused if an organization is targeted by threat actors. All the tactics and techniques covered in this course will definitely help them in their pathway to become a Red Teamer and help organizations to secure the boundaries/insider threats.

Red Team Analyst Course Highlights:

Red Team Methodology and Phases
In-depth understanding of the MITRE ATT&CK FrameWork
Understand technologies deployed in Enterprises
Understand & Simulate Threat Actor Lifecycle
Abuse Web & Network technologies
Understand & Abuse Active Directory
Understand Internal & External Red Teaming concepts
Instructions to deploy Red Team Lab Locally

Lab Highlights:

Abuse Web & Network Technologies
Manually perform Network Pivoting
Kerberos Based Attacks
Perform Red Team Cycle in Enterprise Environment
Hands-on approach to Red Teaming External & Internal environment
Multiple segregated networks with updated Windows workstations

Syllabus Highlights:

Red Team Analyst Course is divided in to 5 main modules categorized below

Introduction to Red Teaming:

  • What is Red Teaming?
  • Red Team Attack Lifecycle (Phases)
  • Red Team Infrastructure (Nomenclature)
  • Enterprise Environment Overview
  • Technologies Exploitation in Red Teaming (Web, Network, Cloud)

Red Teaming in External Environment:

  • External Infrastructure Overview
  • Externally exposed service exploitation
  • Exploitation (Web & Network based)
  • Post-Exploitation (Web & Network based)

Red Teaming in Internal Environment:

  • Internal Infrastructure Overview
  • Infrastructure Enumeration (Active Directory Environment)
  • Active Directory Phases Exploitation (Initial Recon to Domain Admin)

Red Team Lab setup:

  • Virtual Environment Setup & Configuration
  • Setting up Attacker Machine
  • External Red Team Lab Setup (Employee Machine Installation)
  • Internal Red Team Lab Setup (Active Directory Setup)

Case Study:

  • Accessing the Lab
  • Lab Architecture
  • Mapping the Lab with MITRE ATT&CK Framework
  • External Red Teaming
  • Internal Red Teaming
  • Utilizing LOLBAS for stealth persistence & Data Exfiltration
  • Preparing for Examination
 

Pre-Requisites:

Eagerness to learn Basic Knowledge of Pentesting Methodology Recommended for Beginners

Certification Procedure:

To earn CyberWarFare Certified Red Team Analyst certificate, candidate must fulfill below criteria :

  • Appear in hands-on practical 24 hour examination
  • Candidate must complete the challenge & share the detailed report within next 24 hours
  • Minimum passing score is 70%
 

Skills Reflected by Certificate Holder:

  • Knowledge of Red Team Methodologies
  • Understanding of MITRE ATT&CK Red Team TTPs
  • Identifying and Manipulating weakest link in the chain of target
  • Extensive Recon in Internal & External Enterprise infrastructure
  • Perform Kerberos based attacks in fully patched AD environment
  • Bypassing segregated Networks with updated Linux & Windows OS
  • Network Pivoting & Lateral Movement Techniques in multi-OS environment

Copyright ©2021 CyberWarFare Labs. All Rights Reserved