Course Overview

Have you found yourself in a situation where you need to emulate advanced persistent threats? Or are you required to implement monitoring systems or even Security Operations Centers and don’t know where to start? Is the state of your security, not knowing whether you can catch and stop malicious actors, keeping you up at night?  

Purple Teams is a cyber defense methodology that involves collaboration between offensive security and defensive security personnel to improve the cybersecurity capabilities of an organization. Purple Teams optimize the effectiveness of the red and blue teams through the integration of the defensive tactics and controls from the blue team with the threats and vulnerabilities found by the red team into a single narrative that maximizes both these capabilities.? 

The goal of this course is to provide a comprehensive methodology and expand the horizons of cybersecurity professionals with hands-on examples taken from real-world attacks. You will learn all about attacking techniques, gaining footholds, spreading over and finally taking control of a network. Simultaneously, you will learn about IoCs, detection, and prevention against these attacks to create and fine-tune your security policies and tools.  

What You Will Learn

  • Understand Advanced threat actors attacking methodology and mindset.
  • Create malicious payloads and gaining a foothold in the network.
  • Elevate privileges and spread through network
  • ultimately gaining full control over it.
  • Create rules and leverage tools to detect malicious actions in internal network and apply to your own Security Operations Center.
  • Hunt for anomalies in network behavior and identify attacker’s IoC.
  • Report on findings to improve overall security posture of the organization.

Program Curriculum

  • How Red and Blue Make Purple
  • Project Planning and Rules of Engagement
  • Methodologies: Unified Kill Chain
  • MITRE ATT&CK and D3FEND
  • Lab Setup
  • Chapter 1 Quiz

  • Perimeter Defenses
  • Security Operations Center
  • Obtaining Initial Access
  • Social Engineering: Phishing
  • Malware Development and Obfuscation
  • Command&Control Channels and Infrastructure
  • Chapter 2 Quiz

  • Common Misconfigurations on Local Systems
  • PowerShell Attacks – PowerSploit Suite
  • Process Injection
  • DLL Hijacking
  • Token Manipulation and Impersonation of Users
  • Chapter 3 Quiz

  • Active Directory Essentials
  • Discovery and Enumeration
  • AD Enumeration Tools
  • Automating the Sniff - BloodHound
  • Chapter 4 Quiz

  • Credential Access and Dumping, PassTheHash
  • Password Attacks – Kerberoast and Silver/Golden Tickets
  • The Power of SMB Relaying, LLMNR, and NBT-NS Poisoning
  • WMI for Lateral Movement
  • WinRM for Lateral Movement
  • PsExec for Lateral Movement
  • DCOM Objects for Lateral Movement
  • Miscellaneous Attack Vectors
  • Chapter 5 Quiz

  • Hiding in Plain Sight
  • DLLs and Other Hijacking Techniques for Persistence
  • Persistence Through Existing Services and Protocols in Windows Domain
  • Covert Hiding Places
  • Domain Persistence
  • Chapter 6 Quiz

  • Getting the Data to C&C
  • Ransomware Simulation
  • Documenting - VECTR
  • Chapter 7 Quiz
Load more modules

Instructor

Danijel Teslić

Danijel Teslić is the Head of the Red Team operations department in Combis d.o.o., a large ICT company offering security services all over Central and Southeastern Europe. With 8 years of experience in ethical hacking, attacking various corporations, exploiting weaknesses in their infrastructure, and taking over entire networks, he acquired extensive knowledge of how attackers operate. Working as a project manager alongside defenders in Purple Team engagements, Danijel guided and helped defensive teams and Security Operations Centers to tighten their controls and be more effective in stopping the attackers.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Courses

1 of 8