ADVERSARIAL THREAT MODELING AND EMULATION

August 10, 2016 | Courses | By Brian |

The Adversarial Threat Modeling and Emulation course is an intense, hands-on course that takes students through each stage of offensive operations methodologies using tradecraft, stealth and detection avoidance as the key principals. Students will gain proficiency with open-source penetration tools and learn techniques in vulnerability scanning, remote and client-side exploitation, and advanced post-exploitation techniques targeting both Windows and UNIX based operating systems. Students will utilize a wide range of advanced exploitation techniques to gain remote execution on multiple platforms ranging from Ubuntu to Windows 10. The course culminates with a comprehensive, challenging Capture-the-Flag competition. The exercise is a scenario-based challenge that engages the students in a friendly competition between two teams to capture multiple flags implanted throughout the network and solve various challenges and tasks. Techniques used will cover the gamut from scanning, network exploitation, and backdoor installation to artifact recovery and forensics.