top of page
hmlogo_edited_edited.jpg

Attacker Tactics For Blue Teams

About The Course

Defend smarter, detect faster, and learn how to respond with precision by learning what other training courses are not teaching: how to plan, think, act and hide as a real attacker - using any required level of sophistication. 

keyb - Copy.jpg

In this course you will learn

OSINT

Learn how to tactically profile your target with open source intelligence gathering and develop an attack plan.

Breaching

Master how to find the sweet spot for the initial breach that will leave the Blue Team guessing.

Stealth

Learn to hide like a professional data thief - beyond industry tool detection - and learn how to apply the "Pyramid of Pain".

Exfiltration

Learn how to smuggle data out in various ways & learn how to expand your own detection.

Laptop Keyboard

Who is this course for?

Anyone that wants to learn how to get inside the mind of any given attacker and learn how to be one step ahead of modern offensive intrusion tactics.

Location

On site or remote

Max. Attendees

10

Language

English

Duration

1 day

Course Details

Syllabus

  • Introduction 

  • Attacker taxonomy

  • Pyramid of Pain

  • Threat actor sophistication

  • Denial of service

  • Target profiling

  • Preparing for Blue Team tactics

  • Anti-Forensics

  • Models versus reality

  • Predicting behavior

  • Tools versus Living Off The Land

  • Stealth & Persistence

  • Exfiltration

  • Demos and quizes

  • Your questions

Video Game

Your Instructor

A cyber security industry authority and ethical hacker with over 23 years of authentic cyber security consultancy - at your service.

point.jpg

Tom Van de Wiele

Ethical Hacker | Lead Advisor | Founder Hacker Minded

bottom of page