Description
Price: 12.00 USD | Size: 3.09 GB | Duration : 13.11 Hours | 4 Days Video Lessons |
BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD | 4.9
Stealth Cyber Operator [CSCO]
“Mastering Stealth Cyber Operations: The Ultimate CSCO Training”
- Red Team Resource Development [Infra Setup]
- Abuse improperly placed and mis-configured security controls in infrastructure
- Trade-craft development for Offensive Operations
- Resource abuse using Windows APIs, C, C++ & Csharp
- Utilizing Trade-craft for Red Teaming in Hardened Environment
- Leveraging Endpoint Security Controls (AV, EDR) & so much more…
Red Team Resource Development
- Enterprise Security Controls Architecture
- Bypassing / Circumventing Initial Access Defenses
- Red Team Infrastructure Development
- Initial Access by Abusing Enterprise Applications
- Custom scripts / code for Operational Security
Trade-craft Development for Offensive Operations
- Hands-on offensive trade-craft development (C# & Windows API)
- Fully Undetectable (FUD) payload creation strategies
- Understanding Microsoft & Linux Based Security Controls
- Defense Evasion Strategies for malware development
Utilizing Trade-craft for Red Teaming in Hardened Environment
- Microsoft based security controls defense evasion
- Circumventing Host & Network based security controls
- Interesting Cross Forest Trust abuse scenario
- Custom ways for credential access in windows & Linux boxes
- Real-World Engagement case scenarios
Blinding Endpoint Defenses [Explicit Edition]
- ETW & EDR Basics
- Deep Diving into endpoint security internals
- Evasion Strategies & Exercises
- FUD ETW & EDR Bypasses
- Enterprise Security Controls Lab Access
Cyber Range Lab Highlights
- Stealth-Ops Enterprise Simulation Lab
- Stealth-Ops Completion Certificate + Exam Badge
- Hands-on Endpoint Defense Evasion Exercises
- StealthOps VM containing custom code snippets
- Study Materials : 200+ Pages PDF
- Setup your own OPSEC safe Red Team Infra
Pre-requisites
Following are the requirements:
- Fair Knowledge of Networking and Web Technology *
- Familiarity with command line interface
- Familiarity with virtualization technologies
- Basics of Penetration testing methodology
- An Open mind 😊
* Basic coding knowledge in C is good but not mandatory.
Target Audience
Targeted Audience may include the following group of people:
- Penetration Testers / Red Teams
- System Administrators
- Malware Developers
- SOC analysts
- Threat Hunting Team
- Last but not the least, anyone who is interested in strengthening their offensive and detection capabilities
Discover more from Easy Learning (Since 2013)
Subscribe to get the latest posts sent to your email.