Companies Home Search Profile

SEC564 Red Team Exercises and Adversary Emulation

Focused View

5:21:39

76 View
    1. About the Course
  • 1.mp4
    01:49
  • 2.mp4
    02:01
  • 3.mp4
    00:44
  • 4.mp4
    02:09
  • 5.mp4
    00:59
  • 6.mp4
    00:31
    2. Defining Terms
  • 1.mp4
    00:12
  • 2.mp4
    00:43
  • 3.mp4
    00:51
  • 4.mp4
    02:07
  • 5.mp4
    01:33
  • 6.mp4
    01:37
  • 7.mp4
    01:27
  • 8.mp4
    01:16
  • 9.mp4
    01:00
  • 10.mp4
    01:11
    3. Motivation and Introduction
  • 1.mp4
    00:11
  • 2.mp4
    01:08
  • 3.mp4
    00:47
  • 4.mp4
    01:31
  • 5.mp4
    01:49
  • 6.mp4
    01:44
  • 7.mp4
    01:02
    4. Frameworks and Methodologies
  • 1.mp4
    00:42
  • 2.mp4
    03:01
  • 3.mp4
    01:10
  • 4.mp4
    01:23
  • 5.mp4
    01:43
  • 6.mp4
    01:36
  • 7.mp4
    00:47
  • 8.mp4
    00:52
  • 9.mp4
    01:05
  • 10.mp4
    01:32
  • 11.mp4
    01:24
  • 12.mp4
    00:44
    5. Threat Intelligence
  • 1.mp4
    00:15
  • 2.mp4
    01:06
  • 3.mp4
    02:18
  • 4.mp4
    01:46
  • 5.mp4
    00:45
  • 6.mp4
    00:43
  • 7.mp4
    01:14
  • 8.mp4
    03:14
  • 9.mp4
    01:16
  • 10.mp4
    00:55
  • 11.mp4
    01:22
  • 12.mp4
    01:34
  • 13.mp4
    00:18
  • 14.mp4
    00:52
    6. Planning
  • 1.mp4
    00:17
  • 2.mp4
    00:58
  • 3.mp4
    01:42
  • 4.mp4
    00:52
  • 5.mp4
    01:12
  • 6.mp4
    01:17
  • 7.mp4
    00:45
  • 8.mp4
    01:35
  • 9.mp4
    01:17
    7. Roles and Responsibilities
  • 1.mp4
    00:06
  • 2.mp4
    01:01
  • 3.mp4
    02:30
  • 4.mp4
    00:56
  • 5.mp4
    00:43
  • 6.mp4
    01:05
  • 7.mp4
    00:38
    8. Rules of Engagement
  • 1.mp4
    00:05
  • 2.mp4
    01:28
  • 3.mp4
    01:26
  • 4.mp4
    01:25
  • 5.mp4
    01:16
  • 6.mp4
    01:23
  • 7.mp4
    01:17
  • 8.mp4
    00:41
    9. Attack Infrastructure
  • 1.mp4
    00:17
  • 2.mp4
    01:35
  • 3.mp4
    00:39
  • 4.mp4
    02:01
  • 5.mp4
    01:21
  • 6.mp4
    01:12
  • 7.mp4
    00:08
  • 8.mp4
    00:38
  • 9.mp4
    02:04
  • 10.mp4
    01:07
  • 11.mp4
    01:43
  • 12.mp4
    01:07
  • 13.mp4
    02:02
  • 14.mp4
    01:13
  • 15.mp4
    04:38
  • 16.mp4
    02:28
  • 17.mp4
    01:38
  • 18.mp4
    02:12
    10. Exercise Execution
  • 1.mp4
    00:21
  • 2.mp4
    00:47
    11. Reconnaissance
  • 1.mp4
    00:46
  • 2.mp4
    00:40
  • 3.mp4
    02:38
  • 4.mp4
    01:36
  • 5.mp4
    02:22
  • 6.mp4
    01:10
    12. Social Engineering
  • 1.mp4
    00:26
  • 2.mp4
    01:41
  • 3.mp4
    02:39
  • 4.mp4
    01:21
  • 5.mp4
    00:15
  • 6.mp4
    00:11
    13. Weaponization
  • 1.mp4
    00:10
  • 2.mp4
    02:03
  • 3.mp4
    04:03
  • 4.mp4
    01:19
  • 5.mp4
    01:29
  • 6.mp4
    01:01
  • 7.mp4
    02:52
  • 8.mp4
    04:19
  • 9.mp4
    02:19
  • 10.mp4
    03:33
  • 11.mp4
    02:51
  • 12.mp4
    00:41
  • 13.mp4
    01:57
  • 14.mp4
    02:14
  • 15.mp4
    01:15
  • 16.mp4
    01:08
  • 17.mp4
    02:18
    14. Delivery
  • 1.mp4
    00:07
  • 2.mp4
    01:58
  • 3.mp4
    01:00
  • 4.mp4
    02:03
  • 5.mp4
    00:13
  • 6.mp4
    00:30
    15. Conclusion for 564.1
  • 1.mp4
    01:44
    1. Initial Access
  • 1.mp4
    00:32
  • 2.mp4
    02:45
  • 3.mp4
    01:33
  • 4.mp4
    00:15
  • 5.mp4
    03:30
  • 6.mp4
    01:51
  • 7.mp4
    00:57
  • 8.mp4
    01:18
  • 9.mp4
    01:55
  • 10.mp4
    01:39
  • 11.mp4
    00:56
  • 12.mp4
    00:11
    2. Network Propagation
  • 1.mp4
    00:15
  • 2.mp4
    01:06
    3. Discovery
  • 1.mp4
    00:14
  • 2.mp4
    03:00
  • 3.mp4
    02:10
  • 4.mp4
    01:47
  • 5.mp4
    01:21
  • 6.mp4
    00:58
  • 7.mp4
    03:08
  • 8.mp4
    04:13
  • 9.mp4
    02:35
  • 10.mp4
    01:18
  • 11.mp4
    01:28
  • 12.mp4
    00:57
  • 13.mp4
    01:06
  • 14.mp4
    01:17
  • 15.mp4
    01:47
  • 16.mp4
    01:20
  • 17.mp4
    01:22
    4. Privilege Escalation
  • 1.mp4
    00:13
  • 2.mp4
    01:01
  • 3.mp4
    01:35
  • 4.mp4
    01:47
  • 5.mp4
    01:57
  • 6.mp4
    01:48
  • 7.mp4
    01:00
  • 8.mp4
    01:30
  • 9.mp4
    01:06
  • 10.mp4
    01:02
  • 11.mp4
    01:17
  • 12.mp4
    01:56
    5. Persistence
  • 1.mp4
    00:09
  • 2.mp4
    00:59
  • 3.mp4
    01:20
  • 4.mp4
    01:09
  • 5.mp4
    01:28
  • 6.mp4
    00:59
  • 7.mp4
    00:34
  • 8.mp4
    00:12
  • 9.mp4
    00:47
    6. Defense Evasion and Execution
  • 1.mp4
    00:30
  • 2.mp4
    01:09
  • 3.mp4
    01:08
  • 4.mp4
    00:47
  • 5.mp4
    01:07
  • 6.mp4
    01:13
  • 7.mp4
    01:32
  • 8.mp4
    00:22
  • 9.mp4
    00:44
  • 10.mp4
    00:42
  • 11.mp4
    01:12
  • 12.mp4
    00:50
  • 13.mp4
    00:44
  • 14.mp4
    00:43
  • 15.mp4
    01:01
    7. Credential Access
  • 1.mp4
    00:06
  • 2.mp4
    01:59
  • 3.mp4
    01:19
  • 4.mp4
    00:52
  • 5.mp4
    01:10
  • 6.mp4
    01:08
  • 7.mp4
    01:14
  • 8.mp4
    02:14
  • 9.mp4
    00:57
  • 10.mp4
    01:56
  • 11.mp4
    01:16
  • 12.mp4
    00:51
  • 13.mp4
    01:10
  • 14.mp4
    00:47
  • 15.mp4
    00:55
    8. Lateral Movement and Pivoting
  • 1.mp4
    00:09
  • 2.mp4
    00:28
  • 3.mp4
    01:04
  • 4.mp4
    01:30
  • 5.mp4
    01:27
  • 6.mp4
    01:17
  • 7.mp4
    01:00
  • 8.mp4
    00:23
  • 9.mp4
    00:28
  • 10.mp4
    00:09
    9. Action on Objectives
  • 1.mp4
    00:12
  • 2.mp4
    00:41
    10. Target Manipulation Collection and Exfiltration
  • 1.mp4
    00:08
  • 2.mp4
    02:12
  • 3.mp4
    00:41
  • 4.mp4
    02:45
  • 5.mp4
    01:11
  • 6.mp4
    01:21
  • 7.mp4
    00:16
  • 8.mp4
    00:13
    11. Exercise Closure
  • 1.mp4
    00:21
  • 2.mp4
    02:07
  • 3.mp4
    02:15
    12. Analysis and Response
  • 1.mp4
    00:07
  • 2.mp4
    01:40
  • 3.mp4
    01:02
  • 4.mp4
    01:28
  • 5.mp4
    00:50
  • 6.mp4
    00:42
  • 7.mp4
    00:53
    13. Reporting
  • 1.mp4
    00:05
  • 2.mp4
    02:59
  • 3.mp4
    00:48
  • 4.mp4
    00:37
  • 5.mp4
    00:27
  • 6.mp4
    00:31
    14. Remediation and Action Plan
  • 1.mp4
    00:07
  • 2.mp4
    00:44
  • 3.mp4
    01:05
  • 4.mp4
    00:43
  • 5.mp4
    00:42
  • 6.mp4
    00:37
  • 7.mp4
    00:33
  • 8.mp4
    00:27
  • 9.mp4
    01:05
  • 10.mp4
    00:09
  • 11.mp4
    00:09
  • 12.mp4
    00:29
  • 13.mp4
    00:14

More details


User Reviews
Rating
0
0
0
0
0
average 0
Total votes0
Focused display
The SANS Institute is a private U.S. for-profit company founded in 1989 that specializes in information security, cybersecurity training, and selling certificates. Topics available for training include cyber and network defenses, penetration testing, incident response, digital forensics, and auditing.
  • language english
  • Training sessions 260
  • duration 5:21:39
  • Release Date 2023/06/16

Courses related to Cyber Security

Subtitle
Keep Cyber Simple!
Udemy Larry Watlington
Larry Watlington
Keep Cyber Simple!
5:24:04
English subtitles
04/21/2024

Courses related to Network Security

Courses related to Information Security