Red Teams breach organizations and applications. They emulate adversary TTPs. They get into the mindset of these threat actors and execute emulation plans to find weaknesses in their organization's defenses. If you want to defend organizations by deploying adversaries' tactics, then Cybrary’s RTXO series is for you.
Focuses on basics of designing, implementing, and maintaining Red Team operations for both smaller and larger organizations. Explore concepts of Red Teaming and how the Attack Chain works in conducting offensive operations. Review between Red & Blue operations to determine what roles are required throughout the entire incident response life cycle.
Explore the exciting world of Red Team operations and how the process phases impact each engagement. Learn about threat emulation, TTPs, threat profiles, and deliver an effective report readout. Identify the perfect individual to lead your Red Team operations, and gain a new perspective to be better prepared for your role!
Focusing around the specific roles that are needed to run successful Red Team operations. The exercises throughout this course provide learners with valuable experience in managing different sections of an engagement experience, which provides everyone with a deeper understanding of the goals behind and during the actual Red Team engagement.
Focuses on the program level perspectives and experience needed to run both small and large Red Teams across your organization. With challenges like timelines and budget constraints always in place, how can we complete research and have time (as a Red Team) to attack in a smart and focused way that benefits our Blue Team and entire organization?
OSINT (Open Source Intelligence) is how most engagements begin from an adversary perspective. Be sure your organization isn’t exposing too much by leveraging the same tactics adversaries deploy. Learn to scan and identify open-source signals available to adversaries so you can mitigate these risks for your organization.
Once you’ve identified information of interest with OSINT, it’s time to enumerate those findings to expand your understanding. In this course, we’ll dive into tools and techniques to expand on your findings while continuing to leverage publicly available information about your organization. See what the adversaries see so you can close those holes.
Once you’ve collected your intel and enumerated your targets, validating them before beginning an engagement is essential. You can do this manually, but often this is difficult at the enterprise scale. Learn the tools and techniques to automate the acquisition and validation of your targets so you can focus the Red Team engagement going forward.
Successful breaching and initial access require a Red Team to have a thorough plan of attack. Hone the craft of setting up resilient infrastructure, developing a highly successful payload, and get hands-on delivering those via a successful phishing campaign in this collection of courses in Cybrary's RTXO series.
Once in an environment, Red Teams have to quietly get as much intel as they can and quickly follow that up with other activities to secure their position and accomplish objectives on goal. Get the skills you need to own an active directory, pivot expertly, and attack other target systems in this collection of courses in Cybrary’s RTXO series.
As if there wasn't enough to sweeten the deal, Cybrary's RTXO Series delivers even more for Red Teams to improve their physical and social attacks. Make sure you're prepared to pick locks, bypass locks, cleverly social engineer your way into a facility, use vishing to get what you need, and more in this series of courses from Cybrary's RTXO series.