Red Team Exercises and Operations (RTXO) Content Series
Red Teams breach organizations and applications. They emulate adversary TTPs. They get into the mindset of these threat actors and execute emulation plans to find weaknesses in their organization's defenses. If you want to defend organizations by deploying adversaries' tactics, then Cybrary’s RTXO series is for you.
Already have an account? Sign In »
Outline
Cybrary Select content provides organizations with advanced content over and above whats present in the catalog today, focused on high-value skills in cybersecurity.
Overview
Focuses on basics of designing, implementing, and maintaining Red Team operations for both smaller and larger organizations. Explore concepts of Red Teaming and how the Attack Chain works in conducting offensive operations. Review between Red & Blue operations to determine what roles are required throughout the entire incident response life cycle.
Overview
Red Teams don’t create themselves. Emulation plans aren’t delivered ready to go. Planning a Red Team operation ensures the success of the engagement. Join SME Matt Mullins as he provides real-world examples, scenarios, and recommendations on how to do this well, including operational phases, integrating threat intel, and leveraging threat profiles.
Overview
Red Team engagements typically involve coordination between a number of teams and critical roles. Managing these operations well requires a deep understanding of the organization, its objectives, and its size, among other things. This course will give you the perspective you need to captain an effective Red Team engagement.
Overview
Timelines are short, and more budget dollars are always nice. Being able to manage these constraints while still effectively researching, planning, and executing is a challenge. Keeping a team motivated to succeed in spite of this is tough. Join SME Matt Mullins as he speaks from his experience and trades tactics to mitigate these challenges.
Overview
OSINT (Open Source Intelligence) is how most engagements begin from an adversary perspective. Be sure your organization isn’t exposing too much by leveraging the same tactics adversaries deploy. Learn to scan and identify open-source signals available to adversaries so you can mitigate these risks for your organization.
Overview
Once you’ve identified information of interest with OSINT, it’s time to enumerate those findings to expand your understanding. In this course, we’ll dive into tools and techniques to expand on your findings while continuing to leverage publicly available information about your organization. See what the adversaries see so you can close those holes.
Overview
Once you’ve collected your intel and enumerated your targets, validating them before beginning an engagement is essential. You can do this manually, but often this is difficult at the enterprise scale. Learn the tools and techniques to automate the acquisition and validation of your targets so you can focus the Red Team engagement going forward.
Overview
Successful breaching and initial access require a Red Team to have a thorough plan of attack. Hone the craft of setting up resilient infrastructure, developing a highly successful payload, and get hands-on delivering those via a successful phishing campaign in this collection of courses in Cybrary's RTXO series.
Overview
Once in an environment, Red Teams have to quietly get as much intel as they can and quickly follow that up with other activities to secure their position and accomplish objectives on goal. Get the skills you need to own an active directory, pivot expertly, and attack other target systems in this collection of courses in Cybrary’s RTXO series.
Overview
As if there wasn't enough to sweeten the deal, Cybrary's RTXO Series delivers even more for Red Teams to improve their physical and social attacks. Make sure you're prepared to pick locks, bypass locks, cleverly social engineer your way into a facility, use vishing to get what you need, and more in this series of courses from Cybrary's RTXO series.