Featured resource
2026 Tech Forecast
2026 Tech Forecast

Stay ahead of what’s next in tech with predictions from 1,500+ business leaders, insiders, and Pluralsight Authors.

Get these insights
  • Course

Assessing Red Team Post Exploitation Activity

In this course, you will explore the mindset and techniques used by red team operators and common cyber adversaries, and the ways the defensive teams can detect and even get ahead of these malicious actions.

Intermediate
1h 3m
(18)

Created by Dale Meredith and Aaron Rosenmund

Last Updated Mar 19, 2024

Course Thumbnail
  • Course

Assessing Red Team Post Exploitation Activity

In this course, you will explore the mindset and techniques used by red team operators and common cyber adversaries, and the ways the defensive teams can detect and even get ahead of these malicious actions.

Intermediate
1h 3m
(18)

Created by Dale Meredith and Aaron Rosenmund

Last Updated Mar 19, 2024

Get started today

Access this course and other top-rated tech content with one of our business plans.

Try this course for free

Access this course and other top-rated tech content with one of our individual plans.

This course is included in the libraries shown below:

  • Security
What you'll learn

Attackers can use some sophisticated and unsophisticated means to slip by external defenses and detections. Insider threat is on the rise and completely bypasses network or remote access inspection and authentication. As a pen-test progresses from the initial access phase into post-exploitation activity, you aim to understand what is being accomplished inside the network and how your internal defenses can accomplish a defense in depth posture. You ask the assessment team to explain not only what steps they are taking to operate inside your already compromised network but also how you can mitigate these capabilities in the future.

Assessing Red Team Post Exploitation Activity
Intermediate
1h 3m
(18)
Table of contents

About the author
Dale Meredith  - Pluralsight course - Assessing Red Team Post Exploitation Activity
Dale Meredith
74 courses 4.5 author rating 5692 ratings

Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT management experience and worked as a CTO for a popular ISP provider. Dale's expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge of the course material.

About the author
Aaron Rosenmund - Pluralsight course - Assessing Red Team Post Exploitation Activity
Aaron Rosenmund
45 courses 4.4 author rating 986 ratings

Aaron M. Rosenmund is a cyber security operations subject matter expert, with a background in federal and business defensive and offensive cyber operations and system automation.

Get started with Pluralsight