SEC564 Red Team Exercises and Adversary Emulation
Focused View
5:21:39
76 View
- 1. About the Course
- 1.mp401:49
- 2.mp402:01
- 3.mp400:44
- 4.mp402:09
- 5.mp400:59
- 6.mp400:31
- 2. Defining Terms
- 1.mp400:12
- 2.mp400:43
- 3.mp400:51
- 4.mp402:07
- 5.mp401:33
- 6.mp401:37
- 7.mp401:27
- 8.mp401:16
- 9.mp401:00
- 10.mp401:11
- 3. Motivation and Introduction
- 1.mp400:11
- 2.mp401:08
- 3.mp400:47
- 4.mp401:31
- 5.mp401:49
- 6.mp401:44
- 7.mp401:02
- 4. Frameworks and Methodologies
- 1.mp400:42
- 2.mp403:01
- 3.mp401:10
- 4.mp401:23
- 5.mp401:43
- 6.mp401:36
- 7.mp400:47
- 8.mp400:52
- 9.mp401:05
- 10.mp401:32
- 11.mp401:24
- 12.mp400:44
- 5. Threat Intelligence
- 1.mp400:15
- 2.mp401:06
- 3.mp402:18
- 4.mp401:46
- 5.mp400:45
- 6.mp400:43
- 7.mp401:14
- 8.mp403:14
- 9.mp401:16
- 10.mp400:55
- 11.mp401:22
- 12.mp401:34
- 13.mp400:18
- 14.mp400:52
- 6. Planning
- 1.mp400:17
- 2.mp400:58
- 3.mp401:42
- 4.mp400:52
- 5.mp401:12
- 6.mp401:17
- 7.mp400:45
- 8.mp401:35
- 9.mp401:17
- 7. Roles and Responsibilities
- 1.mp400:06
- 2.mp401:01
- 3.mp402:30
- 4.mp400:56
- 5.mp400:43
- 6.mp401:05
- 7.mp400:38
- 8. Rules of Engagement
- 1.mp400:05
- 2.mp401:28
- 3.mp401:26
- 4.mp401:25
- 5.mp401:16
- 6.mp401:23
- 7.mp401:17
- 8.mp400:41
- 9. Attack Infrastructure
- 1.mp400:17
- 2.mp401:35
- 3.mp400:39
- 4.mp402:01
- 5.mp401:21
- 6.mp401:12
- 7.mp400:08
- 8.mp400:38
- 9.mp402:04
- 10.mp401:07
- 11.mp401:43
- 12.mp401:07
- 13.mp402:02
- 14.mp401:13
- 15.mp404:38
- 16.mp402:28
- 17.mp401:38
- 18.mp402:12
- 10. Exercise Execution
- 1.mp400:21
- 2.mp400:47
- 11. Reconnaissance
- 1.mp400:46
- 2.mp400:40
- 3.mp402:38
- 4.mp401:36
- 5.mp402:22
- 6.mp401:10
- 12. Social Engineering
- 1.mp400:26
- 2.mp401:41
- 3.mp402:39
- 4.mp401:21
- 5.mp400:15
- 6.mp400:11
- 13. Weaponization
- 1.mp400:10
- 2.mp402:03
- 3.mp404:03
- 4.mp401:19
- 5.mp401:29
- 6.mp401:01
- 7.mp402:52
- 8.mp404:19
- 9.mp402:19
- 10.mp403:33
- 11.mp402:51
- 12.mp400:41
- 13.mp401:57
- 14.mp402:14
- 15.mp401:15
- 16.mp401:08
- 17.mp402:18
- 14. Delivery
- 1.mp400:07
- 2.mp401:58
- 3.mp401:00
- 4.mp402:03
- 5.mp400:13
- 6.mp400:30
- 15. Conclusion for 564.1
- 1.mp401:44
- 1. Initial Access
- 1.mp400:32
- 2.mp402:45
- 3.mp401:33
- 4.mp400:15
- 5.mp403:30
- 6.mp401:51
- 7.mp400:57
- 8.mp401:18
- 9.mp401:55
- 10.mp401:39
- 11.mp400:56
- 12.mp400:11
- 2. Network Propagation
- 1.mp400:15
- 2.mp401:06
- 3. Discovery
- 1.mp400:14
- 2.mp403:00
- 3.mp402:10
- 4.mp401:47
- 5.mp401:21
- 6.mp400:58
- 7.mp403:08
- 8.mp404:13
- 9.mp402:35
- 10.mp401:18
- 11.mp401:28
- 12.mp400:57
- 13.mp401:06
- 14.mp401:17
- 15.mp401:47
- 16.mp401:20
- 17.mp401:22
- 4. Privilege Escalation
- 1.mp400:13
- 2.mp401:01
- 3.mp401:35
- 4.mp401:47
- 5.mp401:57
- 6.mp401:48
- 7.mp401:00
- 8.mp401:30
- 9.mp401:06
- 10.mp401:02
- 11.mp401:17
- 12.mp401:56
- 5. Persistence
- 1.mp400:09
- 2.mp400:59
- 3.mp401:20
- 4.mp401:09
- 5.mp401:28
- 6.mp400:59
- 7.mp400:34
- 8.mp400:12
- 9.mp400:47
- 6. Defense Evasion and Execution
- 1.mp400:30
- 2.mp401:09
- 3.mp401:08
- 4.mp400:47
- 5.mp401:07
- 6.mp401:13
- 7.mp401:32
- 8.mp400:22
- 9.mp400:44
- 10.mp400:42
- 11.mp401:12
- 12.mp400:50
- 13.mp400:44
- 14.mp400:43
- 15.mp401:01
- 7. Credential Access
- 1.mp400:06
- 2.mp401:59
- 3.mp401:19
- 4.mp400:52
- 5.mp401:10
- 6.mp401:08
- 7.mp401:14
- 8.mp402:14
- 9.mp400:57
- 10.mp401:56
- 11.mp401:16
- 12.mp400:51
- 13.mp401:10
- 14.mp400:47
- 15.mp400:55
- 8. Lateral Movement and Pivoting
- 1.mp400:09
- 2.mp400:28
- 3.mp401:04
- 4.mp401:30
- 5.mp401:27
- 6.mp401:17
- 7.mp401:00
- 8.mp400:23
- 9.mp400:28
- 10.mp400:09
- 9. Action on Objectives
- 1.mp400:12
- 2.mp400:41
- 10. Target Manipulation Collection and Exfiltration
- 1.mp400:08
- 2.mp402:12
- 3.mp400:41
- 4.mp402:45
- 5.mp401:11
- 6.mp401:21
- 7.mp400:16
- 8.mp400:13
- 11. Exercise Closure
- 1.mp400:21
- 2.mp402:07
- 3.mp402:15
- 12. Analysis and Response
- 1.mp400:07
- 2.mp401:40
- 3.mp401:02
- 4.mp401:28
- 5.mp400:50
- 6.mp400:42
- 7.mp400:53
- 13. Reporting
- 1.mp400:05
- 2.mp402:59
- 3.mp400:48
- 4.mp400:37
- 5.mp400:27
- 6.mp400:31
- 14. Remediation and Action Plan
- 1.mp400:07
- 2.mp400:44
- 3.mp401:05
- 4.mp400:43
- 5.mp400:42
- 6.mp400:37
- 7.mp400:33
- 8.mp400:27
- 9.mp401:05
- 10.mp400:09
- 11.mp400:09
- 12.mp400:29
- 13.mp400:14
More details
User Reviews
Rating
average 0
Focused display

Sans
View courses SansThe SANS Institute is a private U.S. for-profit company founded in 1989 that specializes in information security, cybersecurity training, and selling certificates. Topics available for training include cyber and network defenses, penetration testing, incident response, digital forensics, and auditing.
- language english
- Training sessions 260
- duration 5:21:39
- Release Date 2023/06/16