This module will introduce the core components and structure of a red team engagement. You will learn how to apply threat intelligence to red team engagements, utilize operations security processes, and set up your own command and control server. By the end of the module, you will be able to plan a red team engagement and understand the methodologies used to emulate a real threat actor.
Loading rooms...
A learning pathway is made up of modules, and a module is made of bite-sized rooms (think of a room like a mini security lab).