• Online, Instructor-Led
Course Description

Learners will better understand advanced threat actor behavior that Mandiant experts have observed through incident response investigations. Learners will also see how Mandiant red teams refine advanced attacker tools, tactics and procedures (TTPs) for use by red teams in their attempts to emulate advanced threat actors. Learners will develop the ability to think like an attacker and creatively use these TTPs to accomplish response goals while avoiding detection.

Learning Objectives

After completing this course, learners should be able to: • Identify, fingerprint and compromise a target with custom crafted payloads while bypassing antivirus (AV) detection • Deploy creative tactics—from older techniques to newer ones— to maintain access to any compromised machine • Understand the tools and methods attackers use to exploit the lowest-level user privileges to gain higher, administrative privileges and move laterally throughout a network while avoiding security alerts • Avoid and bypass various challenges such as application whitelisting, encryption, multi-factor authentication, sandboxes and more

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.