Red Team Practitioner© – Phase 1: Target Enumeration

Course Title: Red Team Practitioner© - Phase 1: Target Enumeration

Session(s): 10 Sessions

Class Time: 8:00AM-4:00PM

Course Overview:

Week 1 of Target Enumeration focuses on information gathering to learn as much as possible about the target business and how it operates. Week 2 of Target Enumeration focuses on scanning perimeter and internal network devices looking for weaknesses. A great deal of the information gathered in Week 1 will be used to develop the attack methodology that will be validated during Week 2 of Target Enumeration.

At the conclusion of Week 1 the student will be able to:

  • Identify critical information assets of an organization
  • Explain how attackers use publicly available information to develop attacks
  • Detail where information resides on the Internet that may be of use to attackers
  • Determine methods to prevent information leakage
  • List information targets of mainline attackers

At the conclusion of Week 2 the student will be able to:

  • Explain the purpose of network scanning
  • Identify vulnerabilities of interest to an attacker
  • List methods to preclude an attacker from gaining valuable information relating to the network
  • Identify activities that would identify a scanning effort is underway against a network
  • Explain how network design can prevent an attacker from gaining an understanding of the network
  • List security controls that prevent network scanning tools from obtaining information about the network that can be used to develop attack plans

Please Note: This course is Phase 1 of 4 in the Red Team Practitioner© program in developing a Cyber Jedburgh Workforce.

Prerequisites: