Red Team Operator Series: Track 3 - Post Exploitation Actions

Once in an environment, Red Teams have to quietly get as much intel as they can and quickly follow that up with other activities to secure their position and accomplish objectives on goal. Get the skills you need to own an active directory, pivot expertly, and attack other target systems in this collection of courses in Cybrary’s RTXO series.

Time
15 hours
Difficulty
Intermediate
Share
NEED TO TRAIN YOUR TEAM? LEARN MORE
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Course Description

Once in an environment, Red Teams have to quietly get as much intel as they can and quickly follow that up with other activities to secure their position and accomplish objectives on goal. Get the skills you need to own an active directory, pivot expertly, and attack other target systems in this collection of courses in Cybrary’s RTXO series.

Provider
Cybrary
Certificate of Completion
Certificate Of Completion

Complete this entire course to earn a Red Team Operator Series: Track 3 - Post Exploitation Actions Certificate of Completion