Certified Enterprise Security Controls Attack Specialist [CESC-AS]

• AV, EDR (Windows & Linux), Directory-Level and Linux Controls Bypass
• Offensive C# Trade-Craft & Windows API Abuse
• Multiple Cross-Forest Attacks in a hardened environment
• Windows Features (AMSI, CLM, UAC, Applocker, WDAC, WDAG, WDEG, Sandbox) Bypass
• Multiple Cross-Forest Attacks in a hardened environment

ENROLL NOW

Materials

250+ Page PDF, 12+Hrs Videos

Instructions

Custom Documentation

Seamless Lab

Critical Healthcare Simulation

Become CESC-AS

Earn Digital Badge + Certificate

CESC-AS Introduction

Apex Threat Actors having advanced capabilities like leveraging in-memory implants, writing custom codes to evade AVs & EDR, moving laterally with custom made Tools, evading host and network level security solutions for stealthiness etc are constantly consolidating their attack techniques (and Tactics) against Defensive Teams.

Students will gain enough knowledge of the enterprise-grade security controls and how they can be stealthily evaded in Host-level, Network-level, Cloud-Level (EDR) and in a monitored Active Directory network having Health Care Simulation. Class will go through TTPs, writing custom toolkit in C#, abusing Windows internals / features and monitoring solutions, writing custom bypasses for evading host & network controls, bypassing cross-forest restrictions in AD Environment having Windows & Linux platforms in order to better refine detection in an enterprise.

 

Enterprise Security Controls Course Highlights

Understand about Security Controls & Solutions
Offensive C# Tradecraft (easy & hard hands-on lab)
Abuse Windows API (easy & hard hands-on lab)
Learn Advanced Initial Access Technique
Abuse / Evade Security Controls (Host, Network)
Active Directory with Windows & Linux environment
Leverage Monitoring & Patching Solutions
Play with EDR

Enterprise Security Controls Lab Highlights

Healthcare Simulation Lab with multiple attack paths
Understand security controls architecture
Follow MITRE ATT&CK to evade monitoring / detection applications
Create & use custom tools in different scenarios
Windows & Linux based Active directory scenario
Learn advanced ways of Initial Access

CESC-AS Syllabus Highlights

Hands-on of Enterprise Security Controls:

• Anti-Virus & End-Point Detection and Response (EDR)
• End-Point Defender Features & EDR Introduction)
• Directory-Level Controls & Linux Environment
• Enterprise Environment Overview
• Technologies Exploitation in Red Teaming

Implementation of Security Controls:

• Virtual Environment Setup & configuration
• Host-Level Controls Setup
• Network-Level Controls Setup
• Linux Environment Setup

Offensive C# Tradecraft:

• Virtual Environment Setup & configuration
• CSharp Essentials & CSharp Beginner
• Offensive C# Trade-Craft

Abusing Windows API:

• Windows API Components
• Windows API Essentials
• Utilizing Windows API for Red Team Profit
• Advanced AV Bypass Scenario

Abusing/Evading Host & Network based security controls:

• Host-Level Security Controls
• Network-Level Security Controls
• EDR Bypass
• Enterprise Grade Lab Environment
• Scope of Engagement
• Lab Solution / walk-through in Video + PDF format
• Preparing for Examination

DOWNLOAD FULL SYLLABUS

Prerequisites:

Understanding of OS, Web & Network based attacks

Understanding of Red Team Methodology

Familiarity with Command line basics

Skills Reflected by Certificate Holder:

• Planning & executing an organized sophisticated attack
• Leveraging in-memory implants & enterprise security solutions
• Bypassing Security Controls deployed with Host& Network
• Custom exploit writing based on variety of scenarios
• Perform stealth operations under monitored or hardened environment
• Bypassing AV, EDR & network-level restrictions

Certification Procedure:

To earn Enterprise Security Control Attack Control Specialist certificate, candidate must fulfill below criteria :

• Appear in hands-on practical 24 hour examination
• Candidate must share the detailed report within next 24 hours
• Minimum passing score is 70%

ENROLL NOW!