Certified Enterprise Security Controls Attack Specialist [CESC-AS]

دوره امنیتی Certified Enterprise Security Controls Attack Specialist [CESC-AS] از موسسه Cyberwarfare آموزش هک و امنیت به سبک Red Team در سطح سازمان و شرکت ها را به صورت جامع آموزش می دهد. دوره CESC-AS به صورت آموزشی عملی است که به طور خاص برای افرادی که به عملیات تیم قرمز (Red Teaming) در سطح بالا و بصورت سازمان یافته علاقه دارند طراحی شده است.

لینک دانلود دوره آموزشی Certified Enterprise Security Controls Attack Specialist [CESC-AS]

 

حجم : 1.44 گیگابایت

دانلود – بخش اول
دانلود – بخش دوم

رمز فايل: technet24.ir

Materials: 250+ Page PDF, 12+Hrs Videos

CESC-AS Introduction

Apex Threat Actors having advanced capabilities like leveraging in-memory implants, writing custom codes to evade AVs & EDR, moving laterally with custom made Tools, evading host and network level security solutions for stealthiness etc are constantly consolidating their attack techniques (and Tactics) against Defensive Teams.

Students will gain enough knowledge of the enterprise-grade security controls and how they can be stealthily evaded in Host-level, Network-level, Cloud-Level (EDR) and in a monitored Active Directory network having Health Care Simulation. Class will go through TTPs, writing custom toolkit in C#, abusing Windows internals / features and monitoring solutions, writing custom bypasses for evading host & network controls, bypassing cross-forest restrictions in AD Environment having Windows & Linux platforms in order to better refine detection in an enterprise.

  1. Hands-on of Enterprise Security Controls
    1. Anti-Virus & End-Point Detection and Response (EDR)
    2. End-Point Defender Features & EDR Introduction)
    3. Directory-Level Controls & Linux Environment
    4. Enterprise Environment Overview
    5. Technologies Exploitation in Red Teaming
  2. Implementation of Security Controls
    1. Virtual Environment Setup & configuration
    2. Host-Level Controls Setup
    3. Network-Level Controls Setup
    4. Linux Environment Setup
  3. Offensive C# Tradecraft
    1. Virtual Environment Setup & configuration
    2. CSharp Essentials & CSharp Beginner
    3. Offensive C# Trade-Craft
  4. Abusing Windows API
    1. Windows API Components
    2. Windows API Essentials
    3. Utilizing Windows API for Red Team Profit
    4. Advanced AV Bypass Scenario
  5. Abusing/Evading Host & Network based security controls
    1. Host-Level Security Controls
    2. Network-Level Security Controls
    3. EDR Bypass
    4. Enterprise Grade Lab Environment
    5. Scope of Engagement
    6. Lab Solution / walk-through in Video + PDF format
    7. Preparing for Examination
دیدگاه

آدرس ایمیل شما منتشر نخواهد شد.