Course Description

This intensive three-day course teaches you how to emulate advanced persistent threats (APTs) in a controlled, ethical environment. You will learn the attacker mindset, the playbook of common APT tactics, techniques and procedures (TTPs), and practical methods for emulating those behaviors in a lab. Instruction covers the full attack lifecycle: 

  • Reconnaissance
  • Initial access
  • Persistence
  • Command & Control (C2)
  • Lateral movement
  • Privilege escalation
  • Evasion


You will practice with realistic lab exercises that mirror how real-world state and criminal actors operate, using vetted tooling and repeatable techniques rather than reinventing offensive primitives Each module includes demonstration with guided steps, and an independent exercise where students need to run emulation sequences in an isolated range.


Why This Matters

Organizations need realistic, repeatable threat emulation to evaluate detection, incident response and resilience. By training to operate like a real threat actor, you will gain insight into attacker decision-making, discover blind spots in monitoring and playbooks, and respond effectively under pressure.


What You'll Be Able to Do

You will learn to:

  • Think like an attacker - how APT operators prioritize objectives and select TTPs
  • Analyze APT reports and map indicators and procedures to defensive gaps
  • Build and run safe, isolated emulation environments that use realistic C2 and persistence patterns
  • Execute common post-exploitation techniques using both public tooling and custom techniques such as BOFs and UAC bypass patterns.
  • Apply obfuscation and evasion methods in a way that demonstrates detection weaknesses.
  • Find, evaluate, and integrate new offensive tools and tactics responsibly after course completion.


Real-World Application

The skills taught here are immediately applicable to: 

  • Purple-team exercises
  • Red/blue training
  • Tabletop war games
  • Penetration tests with an emulation scope
  • Continuous security validation programs


You will be able to design emulation scenarios, run C2-backed exercises in isolated labs to help organizations evaluate defensive telemetry and translate findings into actionable mitigation recommendations.


Who This Is For

This course is intended for beginner pentesters, defenders, incident responders who need to validate detection and response capabilities against realistic APT-style behavior.


Prerequisites

You should already be comfortable with:

  • Windows and Linux administration
  • Networking fundamentals


You will also need an isolated lab environment (virtualized network) where offensive exercises can be run safely

 

Course curriculum

    1. Introduction to Red Teaming

    2. Red Team Definition

    3. Methods for Red Teaming

    4. Red Teaming Benefits

    5. Red Team Engagement Planning Part I

    6. Red Team Engagement Planning Part II

    7. MITRE Framework

    8. Phases of the Intrusion Kill Chain Part I

    9. Phases of the Intrusion Kill Chain Part II

    10. Phases of the Intrusion Kill Chain Part III

    11. Phases of the Intrusion Kill Chain Part IV

    1. Installing Atomic Red Team

    2. Adversary Emulation with Atomic Red Team

    3. Adversary Emulation with CALDERA Part I

    4. Adversary Emulation with CALDERA Part II

    5. Adversary Emulation with CALDERA Part III

    1. Macros for Initial Access

    2. VBA examples

    3. Initial Access, Obfuscation and C2

    4. Advanced Obfuscation Techniques Part I

    5. Advanced Obfuscation Techniques Part II

    6. Advanced Obfuscation Techniques Part III

    7. Bypassing Windows Defender

    8. Command & Control C2 and Bypassing Defenses Part I

    9. Command & Control C2 and Bypassing Defenses Part II

    10. Command & Control C2 and Priv Esc

    11. Command & Control C2 and BOF

About this course

  • $99.00
  • 27 lessons
  • 9 hours of video content

Pricing options

Now you can have Lifetime Access!

Reviews

5 star rating

Great

Branden Foster

This course had a lot of information. I was honored to get to learn from this guy. Thank you very much.

This course had a lot of information. I was honored to get to learn from this guy. Thank you very much.

Read Less