
Courses

Spearphishing Attachment and PowerShell
Phishing is one of the top techniques leveraged in breaches today, and adversaries use it to send malicious attachments to targeted users. PowerShell is a powerful scripting tool that adversaries can exploit to perform recon and run executables. You will detect these adversary techniques and discover ways to mitigate them.

CVE Series: InstallerFileTakeOver (CVE-2021-41379)
InstallerFileTakeOver (CVE-2021-36934) is a Windows elevation of privilege vulnerability that emerged in late 2021 and could allow a threat actor to acquire elevated SYSTEM-level access. You will exploit this vulnerability in a virtual lab environment and learn how to mitigate it so you can protect your organization.

SSH Authorized Keys
SSH Authorized Keys are widely used as credentials for remotely accessing Linux-based systems via SSH. Adversaries can manipulate these keys to give themselves persistence in your environment so they can return at will. Get hands-on detecting and mitigating this adversary action today.

CVE Series: MSHTML Vulnerability (CVE-2021-40444)
The MSHTML Windows remote code execution vulnerability (CVE-2021-40444) identified in September 2021 could allow a threat actor to execute code on a victim’s machine. In this advanced course, you will exploit and mitigate this vulnerability in a secure lab environment, giving you the skills you need to protect your organization.

CVE Series: HiveNightmare (CVE-2021-36934)
HiveNightmare (CVE-2021-36934) is a serious vulnerability that gives threat actors access to sensitive data in the Windows Registry. Don't get stung by HiveNightmare. Get hands-on experience mitigating and exploiting this vulnerability in a secure lab environment by taking this course today.

Red Team Operator Series: Automated Target Acquisition and Validation (RTXO OSINT 103)
Once you’ve collected your intel and enumerated your targets, validating them before beginning an engagement is essential. You can do this manually, but often this is difficult at the enterprise scale. Learn the tools and techniques to automate the acquisition and validation of your targets so you can focus the Red Team engagement going forward.

Red Team Operator Series: Enumeration of Assets (RTXO OSINT 102)
Once you’ve identified information of interest with OSINT, it’s time to enumerate those findings to expand your understanding. In this course, we’ll dive into tools and techniques to expand on your findings while continuing to leverage publicly available information about your organization. See what the adversaries see so you can close those holes.

Red Team Operator Series: Scanning and Identification (RTXO OSINT 101)
OSINT (Open Source Intelligence) is how most engagements begin from an adversary perspective. Be sure your organization isn’t exposing too much by leveraging the same tactics adversaries deploy. Learn to scan and identify open-source signals available to adversaries so you can mitigate these risks for your organization.
Matt has led multiple Red Team engagements, ranging from a few weeks to a year and covering multiple security domains. Outside of Red Teaming, Matt is also a seasoned penetration tester with interests in: AppSec, OSINT, Hardware, Wifi, Social Engineering, and Physical Security. Matt has a Master's degree in Information Assurance and an exhaustive number of certifications ranging from frameworks, management, and hands-on hacking. Matt is a Technical SME at Cybrary, focusing on Adversarial Emulation and Red Teaming for course content.