Event details
Mandiant Academy Training Event
- Course: Creative Red Teaming
- Date: Monday, March 17, 2025 – Friday, March 21, 2025
- Time: 8:00 AM–2:30 PM, daily
- Time Zone: (UTC-08:00) Pacific Time (US & Canada)
- Cost: $5,000 USD or 5 EOD units
- Delivery Method: Instructor-led, virtual delivery
- Location: Google Meet
At a glance
This course draws on the knowledge and experience of Mandiant red teams to help learners improve their ability to prevent, detect, and respond to threats in an enterprise network.
Learners can understand advanced threat actor behavior that Mandiant experts have observed through incident response investigations. Learners will also see how Mandiant red teams refine advanced attacker tactics, techniques, and procedures (TTPs) for use by red teams in their attempts to emulate advanced threat actors. Learners can develop the ability to think like an attacker and creatively use these TTPs to accomplish response goals while avoiding detection.
Mandiant red team conducts this fast-paced technical course with presentations and scenario-based labs based on frontline expertise and intelligence-based security research. Learners receive hands-on experience conducting covert cyber attack simulations that mimic real-world threat actors. They can learn how to bypass advanced network segmentation, multi-factor authentication, and application allowlisting, abuse web applications, escalate privileges, and steal data while circumventing detection methods.
Prerequisites: A background in conducting penetration tests, security assessments, IT administration, and/or incident response. Working knowledge of the Windows operating system, file systems, registry, and use of the Windows command line. Experience with Active Directory, basic Windows security controls, common network protocols, Linux operating systems, Scripting languages (PowerShell, Python, Perl, etc.), and assessment of web applications using the OWASP top 10.
Course goals
After completing this course, learners should be able to:
- Identify, fingerprint, and compromise a target with custom-crafted payloads while bypassing antivirus (AV) detection
- Deploy creative tactics—from older techniques to newer ones—to maintain access to any compromised machine
- Understand the tools and methods attackers use to exploit the lowest-level user privileges to gain higher, administrative privileges and move laterally throughout a network while avoiding security alerts
- Avoid and bypass various challenges, such as application allowlisting, encryption, multi-factor authentication, sandboxes, and more
- Exfiltrate data from “secure” networks undetected, without triggering firewalls or generating alerts
- Identify the goals and challenges of managing a red team operation, including risk measurement and reporting
Who this course helps
Red team members, penetration testers, defenders wanting to understand offensive tactics, techniques, and procedures (TTPs), and information security professionals looking to expand their knowledge base.
What to bring
Laptop with a current web browser and internet connection. All labs and exercises will be accessed through a web browser.
Course materials
Students will receive a lab book and access to all required class materials and tools.