Course Title: Red Team Practitioner© - Phase 3: Maintaining Access & Exploitation
Session(s): 10 Sessions
Class Time: 8:00AM-4:00PM
Course Overview:
Having gained access, an attacker must maintain access long enough to accomplish his or her objectives. Although an attacker reaching this phase has successfully circumvented your security controls, this phase can increase the attacker’s vulnerability to detection.
At the conclusion of this course the student will be able to:
- Identify means in which an attacker maintains persistence in a network
- Explain how an attacker will hide their activities
- Determine Indicators of Compromise to help establish the presence of an attacker
- Identify pivot points used by the attacker to move through the network
- List the tools used by attackers to help hide their activities
- List the security controls that hamper the attacker’s ability to maintain access
Please Note: This course is Phase 3 of 4 in the Red Team Practitioner© program in developing a Cyber Jedburgh Workforce.