Selecting the Right Tool(s) for Your Red Team Operation

In this course, you’ll learn from Cyber-Security experts Dale Meredith and Aaron Rosenmund as they discuss the importance of choosing the right tool for your red team engagements, as well as their own favorite tools that they recommend to not only recon a target but obtaining access.
Course info
Level
Intermediate
Updated
Jan 9, 2020
Duration
1h 31m
Table of contents
Description
Course info
Level
Intermediate
Updated
Jan 9, 2020
Duration
1h 31m
Description

You have been hired to test the security of a given enterprise network systems and its assets. Choosing the right tool can make the difference between a successful engagement and a total fail. With our toolkit already assembled, we will identify, recommend, and decide on the best way forth, to emulate a real-life red team operation attack. Why? These actions will help ensure that exploits/weaknesses can be detected and prevented by the organization’s blue team.

About the author
About the author

Aaron M. Rosenmund is a cyber security operations and incident response subject matter expert, with a background in federal and business system administration, virtualization and automation.

More from the author
Command and Control with Covenant
Intermediate
20m
Dec 31, 2019
Assessing Red Team Post Exploitation Activity
Intermediate
1h 3m
Dec 19, 2019
More courses by Aaron Rosenmund
About the author

Dale Meredith received his Certified Ethical Hacker and Certified EC-Counsel Instructor certifications back in 2006, as well as being a Microsoft Certified Trainer since 1998 (yes we had computers back then). Dale takes great pride in helping students comprehend and simplify complex IT concepts.

More from the author
Assessing Red Team Post Exploitation Activity
Intermediate
1h 3m
Dec 19, 2019
More courses by Dale Meredith