Certified Enterprise Security Controls Attack Specialist [CESC-AS]
• AV, EDR (Windows & Linux), Directory-Level and Linux Controls Bypass
• Offensive C# Trade-Craft & Windows API Abuse
• Multiple Cross-Forest Attacks in a hardened environment
• Windows Features (AMSI, CLM, UAC, Applocker, WDAC, WDAG, WDEG, Sandbox) Bypass
• Multiple Cross-Forest Attacks in a hardened environment

Materials
250+ Page PDF, 12+Hrs Videos
Instructions
Custom Documentation
Seamless Lab
Critical Healthcare Simulation
Become CESC-AS
Earn Digital Badge + Certificate
CESC-AS Introduction
Apex Threat Actors having advanced capabilities like leveraging in-memory implants, writing custom codes to evade AVs & EDR, moving laterally with custom made Tools, evading host and network level security solutions for stealthiness etc are constantly consolidating their attack techniques (and Tactics) against Defensive Teams.
Students will gain enough knowledge of the enterprise-grade security controls and how they can be stealthily evaded in Host-level, Network-level, Cloud-Level (EDR) and in a monitored Active Directory network having Health Care Simulation. Class will go through TTPs, writing custom toolkit in C#, abusing Windows internals / features and monitoring solutions, writing custom bypasses for evading host & network controls, bypassing cross-forest restrictions in AD Environment having Windows & Linux platforms in order to better refine detection in an enterprise.

Enterprise Security Controls Course Highlights
Understand about Security Controls & Solutions
Offensive C# Tradecraft (easy & hard hands-on lab)
Abuse Windows API (easy & hard hands-on lab)
Learn Advanced Initial Access Technique
Abuse / Evade Security Controls (Host, Network)
Active Directory with Windows & Linux environment
Leverage Monitoring & Patching Solutions
Play with EDR
Enterprise Security Controls Lab Highlights
Healthcare Simulation Lab with multiple attack paths
Understand security controls architecture
Follow MITRE ATT&CK to evade monitoring / detection applications
Create & use custom tools in different scenarios
Windows & Linux based Active directory scenario
Learn advanced ways of Initial Access
CESC-AS Syllabus Highlights
Hands-on of Enterprise Security Controls:
• Anti-Virus & End-Point Detection and Response (EDR)
• End-Point Defender Features & EDR Introduction)
• Directory-Level Controls & Linux Environment
• Enterprise Environment Overview
• Technologies Exploitation in Red Teaming
Implementation of Security Controls:
• Virtual Environment Setup & configuration
• Host-Level Controls Setup
• Network-Level Controls Setup
• Linux Environment Setup
Offensive C# Tradecraft:
• Virtual Environment Setup & configuration
• CSharp Essentials & CSharp Beginner
• Offensive C# Trade-Craft
Abusing Windows API:
• Windows API Components
• Windows API Essentials
• Utilizing Windows API for Red Team Profit
• Advanced AV Bypass Scenario
Abusing/Evading Host & Network based security controls:
• Host-Level Security Controls
• Network-Level Security Controls
• EDR Bypass
• Enterprise Grade Lab Environment
• Scope of Engagement
• Lab Solution / walk-through in Video + PDF format
• Preparing for Examination
Prerequisites:
Understanding of OS, Web & Network based attacks
Understanding of Red Team Methodology
Familiarity with Command line basics
Certification Procedure:
To earn Enterprise Security Control Attack Control Specialist certificate, candidate must fulfill below criteria :

Skills Reflected by Certificate Holder:
• Planning & executing an organized sophisticated attack
• Leveraging in-memory implants & enterprise security solutions
• Bypassing Security Controls deployed with Host& Network
• Custom exploit writing based on variety of scenarios
• Perform stealth operations under monitored or hardened environment
• Bypassing AV, EDR & network-level restrictions
