Certified Cybercop – Red Team

  • by CertCop
  • Course level: All Levels

What Will I Learn?

  • The Certified Cybercop Red Team Certified Training is meant to turn you into a powerful Red Team expert who can defend against cyber attacks and conduct successful penetration testing to detect them. Our Red Team Training course is accredited and organized, and it includes all of the tools and strategies you'll need to become a competent Red Team Cyber Security specialist. With the Cybercop Red Team expert training, you will learn to imitate the thought process and attitude of hackers and digital criminals in order to offensively protect sensitive IT infrastructure.

Topics for this course

27 Lessons19h 30m

Red Team – CertCop

Introduction to Red Team00:25:11
Red Team Methodology00:55:53
Legal/Regulatory Compliance Part 100:30:33
Legal/Regulatory Compliance Part 200:05:49
Recruiting Red Team Members00:27:00
Scoping and Rules of Engagement00:25:30
Reconnaissance (Information Gathering/Discovery) Part 100:52:10
Reconnaissance (Information Gathering/Discovery) Part 200:58:06
Enumeration / Foot printing00:59:50
Shell Scripting / Programming Languages Part 100:55:00
Shell Scripting / Programming Languages Part 225:46
Web Application Penetration Testing Part 100:03:23
Web Application Penetration Testing Part 200:55:00
Cloud Penetration Testing1:09:45
Exploit Frameworks/Exploit Kits Part 101:02:02
Exploit Frameworks/Exploit Kits Part 201:11:02
Exploit Frameworks/Exploit Kits Part 300:37:00
Physical Security Penetration Testing31:36
Social Engineering00:32:45
Red Team Report Writing (Remediation/Action Plan)00:036:16
Purple Team (Red Team Interface with Blue Team)00:31:53
Wireless Networking00:52:48
Incident Response01:06:00
Internet of Things00:43:35
Mobile Device Hacking Part 100:56:36
Mobile Device Hacking Part 200:29:18
Tools/Labs

About the instructors

0 (0 ratings)

311 Courses

244 students

$1,495

Requirements

  • Security & Network Basics
  • OWASP Top 10
  • Basic Incident Response Terminologies.

Target Audience

  • IT Professionals
  • Bounty Hunters
  • Entry Level Red Teamers
  • Pentesters
  • Cyber Security Analysts
  • Incident Responders