BEAT THE HEAT: 25% OFF ANNUAL SUBSCRIPTIONS

00days
:
09hr
:
30min
:
52sec
Back to all modules

Initial Access

Initial Access icon

Explore the different techniques to gain initial access to a target system and network from a Red Teamer’s perspective.

In this module, we will cover the different strategies to gain access to a system in a simulated target network. Explore a variety of popular passive reconnaissance tools, learn about techniques to weaponize files, attack passwords and logins, and practice sending a phishing campaign to exploit a system in our simulated labs.

Initial Access icon

We use cookies to ensure you get the best user experience. For more information contact us.

Read more