Companies Home Search Profile

Assessing Red Team Post Exploitation Activity

Focused View

Dale Meredith

1:03:04

11 View
  • 01 - Course Overview.mp4
    01:28
  • 02 - Introduction.mp4
    00:54
  • 03 - Difficulty in Detecting Reconnaissance.mp4
    00:59
  • 04 - Bypassing the Firewall with Hardware Devices.mp4
    01:53
  • 05 - Understanding the Goal of the Attacker.mp4
    05:31
  • 06 - Explaining Internal Enumeration.mp4
    02:10
  • 07 - Enumerating Domain Devices.mp4
    06:21
  • 08 - Detecting Privilege Escalation Techniques.mp4
    11:11
  • 09 - Assessing Red Team Post Exploitation Activity M4 01.mp4
    03:25
  • 10 - Detecting Malicious SMB Pipes.mp4
    03:02
  • 11 - Determining Attacker Next Steps.mp4
    02:54
  • 12 - Identifying Domain Enumeration Techniques.mp4
    03:35
  • 13 - Determining the Adversary Motivation.mp4
    06:19
  • 14 - Realizing Objectives Beyond Exfiltration.mp4
    01:58
  • 15 - Detecting File Manipulation.mp4
    06:27
  • 16 - Whose Team Are You On-.mp4
    02:36
  • 17 - Training Each Other.mp4
    02:21
  • Description


    In this course, you will explore the mindset and techniques used by red team operators and common cyber adversaries, and the ways the defensive teams can detect and even get ahead of these malicious actions.

    What You'll Learn?


      Attackers can use some sophisticated and unsophisticated means to slip by external defenses and detections. Insider threat is on the rise and completely bypasses network or remote access inspection and authentication. As a pen-test progresses from the initial access phase into post-exploitation activity, you aim to understand what is being accomplished inside the network and how your internal defenses can accomplish a defense in depth posture. You ask the assessment team to explain not only what steps they are taking to operate inside your already compromised network but also how you can mitigate these capabilities in the future.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Dale Meredith
    Dale Meredith
    Instructor's Courses
    Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT management experience and worked as a CTO for a popular ISP provider. Dale's expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge of the course material. Straddling the line of fun and function, Dale's instruction is memorable and entertaining. Dale's knowledge and understanding of current trends in technology and applications have led to many opportunities, such as: training various Inc 500 companies, universities, and Divisions of the Department of Homeland Security for the United States government. Along with authoring for Pluralsight, consulting, and IT classroom training, you can catch Dale on stage speaking at IT conferences, helping IT teams keep their companies safe, relevant, and "breach" aware. Outside of the professional sphere, Dale spends quite a bit of his time giving back by speaking at adult and youth non-profit community gatherings and posting on his 'Dale Dumbs IT Down' social media sites. Dale uses these speaking engagements and social media sites to 'Dumb Down IT' concepts with the intent to help everyone be safe and smart with their technology and personal devices. Dale also specializes in Active Directory, Exchange Server, IIS, PowerShell, SharePoint, System Center/Desktop Deployment, and Private Cloud
    Pluralsight, LLC is an American privately held online education company that offers a variety of video training courses for software developers, IT administrators, and creative professionals through its website. Founded in 2004 by Aaron Skonnard, Keith Brown, Fritz Onion, and Bill Williams, the company has its headquarters in Farmington, Utah. As of July 2018, it uses more than 1,400 subject-matter experts as authors, and offers more than 7,000 courses in its catalog. Since first moving its courses online in 2007, the company has expanded, developing a full enterprise platform, and adding skills assessment modules.
    • language english
    • Training sessions 17
    • duration 1:03:04
    • level average
    • Release Date 2023/12/05