Course Description

This course teaches students how to emulate advanced persistent threats (APTs) in a controlled, ethical environment. You will learn the attacker mindset, the playbook of common APT tactics, techniques and procedures (TTPs), and practical methods for emulating those behaviors in a lab. Instruction covers the full attack lifecycle: reconnaissance, initial access, persistence, command-and-control (C2), lateral movement, privilege escalation, and evasion. Students will practice with realistic lab exercises that mirror how real-world state and criminal actors operate, using vetted tooling and repeatable techniques rather than reinventing offensive primitives.

Course Outcomes

  • Adopt an attacker mindset: how APT operators prioritize objectives and select TTPs.
  • Analyze APT reports and map indicators and procedures to defensive gaps.
  • Build and run safe, isolated emulation environments that use realistic C2 and persistence patterns.
  • Execute common post-exploitation techniques using both public tooling and custom techniques such as BOFs and UAC bypass patterns.
  • Apply obfuscation and evasion methods in a way that demonstrates detection weaknesses.
  • Find, evaluate, and integrate new offensive tools and tactics responsibly after course completion.

Course curriculum

    1. Introduction to Red Teaming

    2. Red Team Definition

    3. Methods for Red Teaming

    4. Red Teaming Benefits

    5. Red Team Engagement Planning Part I

    6. Red Team Engagement Planning Part II

    7. MITRE Framework

    8. Phases of the Intrusion Kill Chain Part I

    9. Phases of the Intrusion Kill Chain Part II

    10. Phases of the Intrusion Kill Chain Part III

    11. Phases of the Intrusion Kill Chain Part IV

    1. Installing Atomic Red Team

    2. Adversary Emulation with Atomic Red Team

    3. Adversary Emulation with CALDERA Part I

    4. Adversary Emulation with CALDERA Part II

    5. Adversary Emulation with CALDERA Part III

    1. Macros for Initial Access

    2. VBA examples

    3. Initial Access, Obfuscation and C2

    4. Advanced Obfuscation Techniques Part I

    5. Advanced Obfuscation Techniques Part II

    6. Advanced Obfuscation Techniques Part III

    7. Bypassing Windows Defender

    8. Command & Control C2 and Bypassing Defenses Part I

    9. Command & Control C2 and Bypassing Defenses Part II

    10. Command & Control C2 and Priv Esc

    11. Command & Control C2 and BOF

About this course

  • $99.00
  • 27 lessons
  • 9 hours of video content

Pricing options

Now you can have Lifetime Access!

Reviews

5 star rating

Great

Branden Foster

This course had a lot of information. I was honored to get to learn from this guy. Thank you very much.

This course had a lot of information. I was honored to get to learn from this guy. Thank you very much.

Read Less

Requirements

While not mandatory, it is recommended that participants have the following tools installed to fully engage with the hands-on exercises:

  • Kali Linux VM
  • Windows 10 VM

These tools will enhance your ability to work effectively with the course materials and practical exercises.