We may earn an affiliate commission when you visit our partners.
Maril Vernon

Learn to map and compromise vulnerable network paths with a real propagating payload and correlate lateral movement testing with MITRE ATT&CK and Zero Trust Principles.

Read more

Learn to map and compromise vulnerable network paths with a real propagating payload and correlate lateral movement testing with MITRE ATT&CK and Zero Trust Principles.

Unsure of whether or not configuration vulnerabilities are providing adversaries with a clear path of lateral movement within your environment? Or do you have untested controls you are “pretty sure” defend against lateral movement?

In this course,

, you will learn how to configure and employ the Infection Monkey to test for lateral movement and network segmentation against known MITRE tactics.

, you will learn how to launch the team server and GUI client.

, you will discover how to configure the Monkey against MITRE.

, you will explore how to identify the vulnerable network paths and interpret results for actionable hardening steps.

When you are finished with this course, you will have the skills and knowledge of lateral movement, network discovery, and credential compromise techniques needed to steps to proactively improve security posture against them.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Course Overview
Lateral Movement with Infection Monkey
Resources

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Develops skills in lateral movement, network discovery, and credential compromise techniques, which are core skills for security professionals
Taught by Maril Vernon, who are recognized for their work in cybersecurity
Examines lateral movement within a network, which is a critical skill for defenders
Leverages tools like Infection Monkey for practical testing
Requires some prior knowledge of cybersecurity and networking
Focuses on testing against MITRE ATT&CK, which may not be relevant to all organizations

Save this course

Save Lateral Movement with Infection Monkey to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Lateral Movement with Infection Monkey with these activities:
Seek guidance from experienced security professionals
Connect with experienced security professionals who can provide valuable insights and guidance on navigating the complexities of lateral movement and network security.
Show steps
  • Identify potential mentors through industry events, online forums, or personal connections.
  • Reach out to mentors and express your interest in their guidance.
  • Build relationships and seek advice on lateral movement and related topics.
Review Network Protocols
Reviewing network protocols will help you understand how the Infection Monkey works and how it interacts with your network.
Browse courses on Network Protocols
Show steps
  • Read the RFCs for the following protocols: TCP, UDP, IP, and ICMP.
  • Create a diagram of the network architecture of your environment.
  • Identify the potential vulnerabilities in your network architecture.
Review MITRE ATT&CK Framework
Gain a deeper understanding of the MITRE ATT&CK Framework to enhance your ability to map and defend against lateral movement attacks.
Browse courses on MITRE ATT&CK
Show steps
  • Explore the MITRE ATT&CK website and its resources.
  • Review the ATT&CK matrix and its various techniques and tactics.
  • Identify the relevance of the ATT&CK Framework to your organization's cybersecurity posture.
13 other activities
Expand to see all activities and additional details
Show all 16 activities
Review MITRE ATT&CK Framework
Review principles of MITRE ATT&CK to identify and address potential network vulnerabilities.
Browse courses on MITRE ATT&CK
Show steps
  • Visit MITRE ATT&CK website
  • Familiarize with the framework's structure
  • Identify tactics, techniques, and procedures (TTPs) relevant to the course
Follow Infection Monkey Setup Guide
Gain hands-on experience setting up and configuring Infection Monkey for lateral movement testing.
Show steps
  • Locate and download the official setup guide
  • Install pre-requisites and dependencies
  • Configure and launch Infection Monkey components
  • Verify successful setup through testing
Configure and Execute Infection Monkey
Configuring and executing Infection Monkey will help you gain hands-on experience with the tool and see how it can be used to identify vulnerabilities in your network.
Show steps
  • Download and install Infection Monkey.
  • Configure Infection Monkey according to the documentation.
  • Execute Infection Monkey against your network.
  • Analyze the results of the Infection Monkey scan.
Lateral Movement Discussion Group
Engage with fellow learners, discuss challenges, share insights, and gain valuable perspectives on lateral movement techniques.
Show steps
  • Join or establish a discussion group
  • Identify topics for discussion
  • Share experiences, knowledge, and resources
  • Collaborate on solving problems and developing strategies
Conduct Network Path Analysis
Develop analytical skills to identify vulnerable network paths and potential areas for lateral movement.
Browse courses on Vulnerability Assessment
Show steps
  • Use network mapping tools like Network Mapper (Nmap)
  • Analyze network diagrams and flow logs
  • Identify potential entry points and weaknesses
  • Develop and implement remediation strategies
Discuss real-world lateral movement case studies
Engage with peers to share and discuss real-world lateral movement case studies, gaining insights into different attack scenarios and mitigation strategies.
Browse courses on Case Studies
Show steps
  • Identify and gather relevant case studies.
  • Organize a group discussion or online forum.
  • Present and analyze the case studies.
  • Develop a collective understanding of the lessons learned and best practices.
Guide junior security analysts
Share your knowledge and experience with junior security analysts, helping them to develop their skills in identifying and mitigating lateral movement risks.
Show steps
  • Identify opportunities to mentor junior analysts.
  • Share your expertise on lateral movement and related topics.
  • Provide guidance and feedback on their projects and assignments.
  • Encourage professional development and growth.
Lateral Movement Test Report
Document and communicate the findings of lateral movement tests, including identified vulnerabilities, remediation steps, and recommendations.
Browse courses on Network Security Analysis
Show steps
  • Analyze test results and identify security weaknesses
  • Develop recommendations for improvement
  • Create a comprehensive report outlining the findings and recommendations
  • Share and discuss the report with relevant stakeholders
Volunteer at a Security Conference
Expand your network, gain exposure to cutting-edge research, and contribute to the community by volunteering at industry events.
Show steps
  • Identify relevant security conferences
  • Explore volunteer opportunities
  • Apply for a volunteer role
  • Attend the conference and fulfill your volunteer duties
  • Network and learn from industry experts
Participate in Lateral Movement Capture the Flag (CTF)
Enhance practical skills and foster a competitive spirit by participating in a CTF designed for lateral movement testing.
Show steps
  • Find a reputable and relevant CTF event
  • Form or join a team
  • Study the rules and objectives
  • Use your knowledge and skills to solve challenges
  • Collaborate and learn from other participants
Simulate lateral movement attack
Create a simulation that demonstrates lateral movement techniques and their impact on network security.
Browse courses on Lateral Movement
Show steps
  • Configure a virtual environment for the simulation.
  • Deploy Infection Monkey and define the attack scenario.
  • Execute the simulation and monitor its progress.
  • Analyze the results to identify the exploited vulnerabilities.
  • Develop recommendations for mitigating lateral movement risks.
Design a Zero Trust implementation plan
Create a comprehensive plan that outlines the steps and strategies for implementing a Zero Trust model within your organization's network infrastructure.
Browse courses on Zero Trust
Show steps
  • Research and understand Zero Trust principles and best practices.
  • Assess your organization's current network infrastructure and security posture.
  • Develop a phased implementation plan that includes milestones and timelines.
  • Identify potential challenges and develop mitigation strategies.
  • Present your plan to stakeholders and gather feedback.
Mentor Junior Security Professionals
Reinforce your knowledge while making a positive impact by mentoring junior professionals in the field of network security.
Show steps
  • Identify opportunities to mentor through professional organizations or programs
  • Establish clear goals and expectations
  • Share your knowledge and expertise
  • Provide guidance and support
  • Track progress and provide constructive feedback

Career center

Learners who complete Lateral Movement with Infection Monkey will develop knowledge and skills that may be useful to these careers:
Cyber Threat Analyst
A Cyber Threat Analyst studies cyber threats and develops threat intelligence reports. They monitor for, track, and analyze security breaches and vulnerabilities. Armed with the skills from a \"Lateral Movement with Infection Monkey\" course, a Cyber Threat Analyst can use hands-on knowledge of a real propagating payload, network discovery, and credential compromise techniques to inform and improve their analytical approaches and deliver more actionable, impactful reports.
Network Security Engineer
Network Security Engineers design, implement, and maintain security measures for computer networks and systems. The \"Lateral Movement with Infection Monkey\" course can help a Network Security Engineer by providing practical experience with network segmentation and lateral movement testing against known MITRE tactics. This will build a foundation to employ refinements to better test the efficiency of their security measures.
Cybersecurity Consultant
Cybersecurity Consultants evaluate and implement security measures for businesses of all sizes. Armed with the skills from the \"Lateral Movement with Infection Monkey\" course, a Cybersecurity Consultant can better assess network vulnerabilities, identify weaknesses, and test security controls. This will help them provide more effective guidance to their clients.
Penetration Tester
Penetration Testers use their skills to identify and exploit vulnerabilities in computer systems and networks. By taking a \"Lateral Movement with Infection Monkey\" course, Penetration Testers can gain hands-on experience with a real propagating payload and learn how to test for lateral movement and network segmentation against known MITRE tactics. This will enhance their ability to evaluate the effectiveness of security measures and improve their testing methodologies.
Vulnerability Assessment Analyst
Vulnerability Assessment Analysts identify, analyze, and prioritize security vulnerabilities in computer systems and networks. By taking a \"Lateral Movement with Infection Monkey\" course, Vulnerability Assessment Analysts can gain hands-on experience with a real propagating payload and learn how to test for lateral movement and network segmentation against known MITRE tactics. This will give them practical knowledge to apply in their assessments and allow them to deliver more comprehensive and actionable reports.
Incident Responder
Incident Responders are responsible for handling security breaches and incidents. By taking a \"Lateral Movement with Infection Monkey\" course, Incident Responders can gain hands-on experience with a real propagating payload and learn how to test for lateral movement and network segmentation against known MITRE tactics. This will allow them to more effectively prioritize and respond to security incidents.
Security Analyst
Security Analysts monitor and analyze security events and data to identify and respond to threats. The \"Lateral Movement with Infection Monkey\" course can help a Security Analyst by providing foundational knowledge of lateral movement testing and network segmentation against known MITRE tactics. This will aid them in developing and implementing stronger security measures and more effectively detecting and responding to threats.
Information Security Analyst
Information Security Analysts plan and implement security measures to protect an organization's information systems and data. By taking a \"Lateral Movement with Infection Monkey\" course, Information Security Analysts can gain hands-on experience with a real propagating payload and learn how to test for lateral movement and network segmentation against known MITRE tactics. This will contribute to more informed and effective security planning and implementation.
Red Team Operator
Red Team Operators simulate cyberattacks to test the effectiveness of an organization's security measures. By taking a \"Lateral Movement with Infection Monkey\" course, Red Team Operators can gain hands-on experience with a real propagating payload and learn how to test for lateral movement and network segmentation against known MITRE tactics. This will allow them to develop more realistic and effective attack simulations.
Blue Team Operator
Blue Team Operators defend against cyberattacks and protect an organization's information systems and data. By taking a \"Lateral Movement with Infection Monkey\" course, Blue Team Operators can gain hands-on experience with a real propagating payload and learn how to test for lateral movement and network segmentation against known MITRE tactics. This will allow them to develop and implement more effective defense strategies.
Cloud Security Architect
Cloud Security Architects design and implement security measures for cloud computing environments. While the \"Lateral Movement with Infection Monkey\" course focuses on on-premises networks, the principles and techniques learned can be applied to cloud environments as well. This course can help Cloud Security Architects better understand lateral movement and network segmentation in the cloud, which can be valuable knowledge for designing and implementing effective cloud security measures.
Security Architect
Security Architects design and implement security measures for computer systems and networks. By taking a \"Lateral Movement with Infection Monkey\" course, Security Architects can gain hands-on experience with a real propagating payload and learn how to test for lateral movement and network segmentation against known MITRE tactics. This will allow them to design and implement more effective security architectures.
IT Security Manager
IT Security Managers oversee and manage the security of an organization's information systems and data. The \"Lateral Movement with Infection Monkey\" course may be useful for IT Security Managers who want to gain a deeper understanding of lateral movement testing and network segmentation against known MITRE tactics. This knowledge can help them make more informed decisions about security investments and policies.
Cybersecurity Engineer
Cybersecurity Engineers design, implement, and maintain security measures for computer systems and networks. The \"Lateral Movement with Infection Monkey\" course may be useful for Cybersecurity Engineers who want to gain hands-on experience with a real propagating payload and learn how to test for lateral movement and network segmentation against known MITRE tactics. This knowledge can help them make more informed decisions about security investments and policies.
Systems Administrator
Systems Administrators manage and maintain computer systems and networks. The \"Lateral Movement with Infection Monkey\" course may be useful for Systems Administrators who want to gain a deeper understanding of lateral movement testing and network segmentation against known MITRE tactics. This knowledge can help them make more informed decisions about security investments and policies.

Reading list

We've selected seven books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Lateral Movement with Infection Monkey.
Provides a comprehensive overview of blue team techniques and methodologies. It valuable resource for anyone interested in learning more about network security.
Provides a comprehensive overview of the Metasploit framework. It valuable resource for anyone interested in learning more about penetration testing.
Provides a comprehensive overview of gray hat hacking techniques. It valuable resource for anyone interested in learning more about ethical hacking.
Provides a comprehensive overview of social engineering techniques. It valuable resource for anyone interested in learning more about the human element of security.
Provides a comprehensive overview of cryptographic engineering. It valuable resource for anyone interested in learning more about the latest security trends.
Provides a comprehensive overview of network security for beginners. It valuable resource for anyone interested in learning more about the basics of network security.
Provides a comprehensive overview of ethical hacking. It valuable resource for anyone interested in learning more about the basics of ethical hacking.

Share

Help others find this course page by sharing it with your friends and followers:
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser