Module 1: Identifying Areas of Vulnerability
- Defining the assets which your company needs to protect
- Defining the other sensitive information that needs to be protected
Module 2: Modern Attack Techniques
- OS platform threats and attacks
- Web based threats and attacks
- E-mail threats and attacks
- Physical access threats and attacks
- Social threats and attacks
- Wireless threats and attacks
Module 3: Reconnaissance
- Open Source Intelligence (OSINT)
- Google hacking
- Social Media presence
- DNS 5. Shodan
- Physical reconnaissance
- Port scanning
- Service discovery
- SIEM
- Intrusion Prevention Systems
Module 4: Weaponization
- Generating malicious payload
- Hiding malicious content in Office Suite documents
- Reverse shells
- Meta sploit
- Empire
- AV evasion techniques
Module 5: Delivery
- Building phishing campaign
- Planting malicious device
- Attacks on 3rd parties
- Enabling phishing protection
- O365 / Safe links
- Smart Screen
- Secure proxy
- Sinkholing
- APT campaigns
Module 6: Exploitation and Installation
- Types of vulnerabilities
- Establishing foothold
- Stage-less and staged payloads / C&C
- Anti-Virus
- Firewall
- Application Whitelisting
- WDAC
- Living Off the Land Binaries
- Exploit Guard
- AMSI
Module 7: Privilege escalation
- Privileged accounts
- System services security
- Common misconfigurations
- Security tokens
- Just Enough Administration
- Patch maintenance
Module 8: Lateral movement
- Credential harvesting
- Mimikatz
- Network reconnaissance
- Building network map
- Responder
- Pass-the-hash
- Pass-the-ticket
- Credential Guard
- LAPS
- GPO policies
- Windows ATA
- Defender ATP
Module 9: Persistency
- Sleeping agents
- Piggybacking on network packets
- Rootkits
- Sysinternals
- Searching for rogue servers
- Looking for network anomalies