![]() |
Master Caldera Adversary Simulation
![]() Master Caldera Adversary Simulation Published 6/2025 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 1.33 GB | Duration: 3h 6m Learn in a practical way how to emulate true hacker groups using Caldera. What you'll learn Define Mitre ATT&CK concepts Define the diference between Pentest and Threat Actor Simulation Define the terminology and structure of Caldera Run different Threat Actors Simulations Create Attackers Commands Implementation Obfuscate and Encode Payloads Research and Monitoring Threat Actors Profiles Practical tools to Map and Monitor Adversaries Behaviors Create Adversaries Profiles Generate a Final Report Requirements Basic Cybersecurity concepts knowledge Basic Operating Systems knowledge Description In this course, you will explore Threat Actor Behavior Simulation using the powerful open-source tool, Caldera. You'll learn how to set up a virtual lab, simulate real-world cyber threats in an automated way, and understand techniques used by adversaries. The course also covers how to create reports and analyze attacker profiles to improve your defense strategy.At first sight, you may think it is very complex but, this course aims to show you how easy it can be.This training is ideal for both beginners and experienced cybersecurity professionals. You will be guided step-by-step through identifying relevant threat actors and continuously updating your simulations to reflect the evolving threat landscape. It's a practical and hands-on approach that goes beyond traditional penetration testing.All tools used are free and open-source, making them accessible to anyone interested in improving their cybersecurity skills. The course is structured to be easy to follow while still offering valuable insights for more advanced learners.I am committed to keeping the course current by adding new content and updates as Caldera evolves. These updates, including bonus material, are available at no additional cost.If you have any questions, suggestions, or feedback, feel free to reach out. I'm always open to connecting and helping you get the most out of this course. Overview Section 1: Introduction Lecture 1 Introduction Lecture 2 MITRE ATT&CK Concepts Section 2: Test Environment Instalation Lecture 3 Lab Presentation Lecture 4 Debian Linux Instalation Lecture 5 Windows Server Instalation Lecture 6 Active Directory and DNS Instalation Lecture 7 Caldera Instalation Lecture 8 Network Configuration Section 3: Caldera's Concepts Lecture 9 Agents Lecture 10 Activities Lecture 11 Payloads Lecture 12 Facts and Fact Sources Lecture 13 Parsers Lecture 14 Adversary Lecture 15 Operations Lecture 16 Differences between Users Section 4: Testing the features and Running Simulations Lecture 17 Testing Operations Lecture 18 Testing Defenders Lecture 19 Testing Payloads Lecture 20 Testing Reports Section 5: Threat Actor Mapping Lecture 21 Mapping and Monitoring Lecture 22 Mapping Tools Lecture 23 Creating our First Actor Profile Lecture 24 Simulation Results Section 6: Ending The Course Lecture 25 Final Message Cybersecurity students and professionals who want to know more about Threat Simulation. Цитата:
|
Часовой пояс GMT +3, время: 13:33. |
vBulletin® Version 3.6.8.
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
Перевод: zCarot