-
Course
- Security
Selecting the Right Tool(s) for Your Red Team Operation
In this course, you’ll learn from Cyber-Security experts Dale Meredith and Aaron Rosenmund as they discuss the importance of choosing the right tool for your red team engagements, as well as their own favorite tools that they recommend to not only recon a target but obtaining access.
What you'll learn
You have been hired to test the security of a given enterprise network systems and its assets. Choosing the right tool can make the difference between a successful engagement and a total fail. With our toolkit already assembled, we will identify, recommend, and decide on the best way forth, to emulate a real-life red team operation attack. Why? These actions will help ensure that exploits/weaknesses can be detected and prevented by the organization’s blue team.
Table of contents
About the authors
Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT management experience and worked as a CTO for a popular ISP provider. Dale's expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge of the course material.
More Courses by DaleAaron M. Rosenmund is a cyber security operations subject matter expert, with a background in federal and business defensive and offensive cyber operations and system automation.
More Courses by Aaron