Red Team Adversary Emulation: Mimicking a real-world cyber attack

Learn how to perform adversary emulation exercises end-to-end

   Watch Promo

What you'll learn

  • How to plan and manage adversary emulation exercise
  • Difference between red teaming and adversary emulation
  • MITRE ATT&CK Framework
  • Red team operations attack lifecycle
  • How to conduct adversary emulation exercise on a live organization
  • Open Source Intelligence (OSINT) techniques to gather information
  • Weaponizing exploits to gain foothold into the network
  • Password brute-forcing using custom generated lists
  • Phishing an employee
  • Escalating Privileges on Linux and Windows systems
  • Active Directory enumeration using BloodHound
  • Active Directory attacks
  • Establishing persistence via PoshC2 (command and control center software)
  • Creating an engagement report

Requirements

  • Basic knowledge of Kali Linux
  • Basic knowledge of PowerShell
  • Basic understanding of penetration testing and red teaming
  • Red Teamer mindset


Who this course is for

  • Students curious about conducting a real-world security engagement
  • Beginners in Red Teaming
  • Students preparing for penetration testing certifications
  • Cybersecurity Professionals


About this course

In this course, we look at an organization's security from a real-world adversary perspective. We are hired by a FinTech startup to conduct an adversary emulation exercise and steal their customer data (before an actual adversary). This exercise assumes zero knowledge about the target network.


During an adversary emulation exercise we mimic a real world cyber attack with a specific objective, such as stealing customer data, launching a ransomware attack etc. This course follows the Red Team Operations Attack Lifecycle to conduct this exercise. We go through each phase in a step-by-step manner and build our attack path as we move ahead. We employee a variety of techniques, such as

  • Active and passive information gathering
  • Gaining foothold into the network
  • Host Discovery
  • Brute-forcing
  • Phishing
  • Privilege Escalation (Linux and Windows)
  • Automated Active Directory domain enumeration
  • Persistence via command and control center
  • Active Directory attacks


to achieve our objective. Upon completion of the exercise, we will prepare and submit a report to the organization's management.

This course also covers installation and usage of tools such as, PoshC2, Mentalist, BloodHound, Mimikatz, Metasploit, PowerUp, icacls, PowerShell etc.

This is a beginner friendly course. If you have just started your career in offensive cybersecurity or are preparing for penetration testing exams then this course is for you. If you are already a penetration tester or a red teamer, with a few years of experience under your belt, then you would already know most of the above mentioned techniques. However, if you are interested in witnessing a live adversary emulation exercise, please feel free to follow along.

Course image source: Freepik.com



Reviews and Ratings

Rodrigo Hierro says:
"Very clear and well organized"
Rating: 5.0 / 5.0

Deniss Bohanovs says:
"This course very interesting and delivered well, not very detailed as i wanted it to be, but great for the beginners. Highly recommended, well done !"
Rating: 4.0 / 5.0

Pentester says:
"Excellent presentations and examples"
Rating: 4.0 / 5.0

Brad Maccarl says:
"It was a great walkthrough of a real world attack."
Rating: 5.0 / 5.0

JJ Giner says:
"It could have been excellent if there was a practical Lab Environment to supplement the course presentation."
Rating: 4.0 / 5.0

Your Instructor


Uday Mittal
Uday Mittal

Uday Mittal (OSCE, OSCP, CISSP, CISA, CISM, DCPP) is the founder of Yaksas CSC. He has over 6 years of experience in dealing with various issues related to cyber security. He is actively working towards educating people on cyber security risks and steps to mitigate them. His areas of interest include exploitation research, malware analysis, red teaming, VAPT etc.


Course Curriculum


  Initial compromise
Available in days
days after you enroll
  Attack Path Recap
Available in days
days after you enroll
  Observations & Recommendations
Available in days
days after you enroll
  Engagement Report
Available in days
days after you enroll
  Course Resources & Feedback
Available in days
days after you enroll
  Conclusion
Available in days
days after you enroll

Frequently Asked Questions


When does the course start and finish?
The course starts now and never ends! It is a completely self-paced online course - you decide when you start and when you finish.
How long do I have access to the course?
How does lifetime access sound? After enrolling, you have unlimited access to this course for as long as you like - across any and all devices you own.
What if I am unhappy with the course?
We would never want you to be unhappy! If you are unsatisfied with your purchase, contact us in the first 30 days and we will give you a full refund.

Get started now!