We may earn an affiliate commission when you visit our partners.
Pluralsight logo

Lateral Movement with Infection Monkey

Maril Vernon

Learn to map and compromise vulnerable network paths with a real propagating payload and correlate lateral movement testing with MITRE ATT&CK and Zero Trust Principles.

Read more

Learn to map and compromise vulnerable network paths with a real propagating payload and correlate lateral movement testing with MITRE ATT&CK and Zero Trust Principles.

Unsure of whether or not configuration vulnerabilities are providing adversaries with a clear path of lateral movement within your environment? Or do you have untested controls you are “pretty sure” defend against lateral movement?

In this course,

, you will learn how to configure and employ the Infection Monkey to test for lateral movement and network segmentation against known MITRE tactics.

, you will learn how to launch the team server and GUI client.

, you will discover how to configure the Monkey against MITRE.

, you will explore how to identify the vulnerable network paths and interpret results for actionable hardening steps.

When you are finished with this course, you will have the skills and knowledge of lateral movement, network discovery, and credential compromise techniques needed to steps to proactively improve security posture against them.

Enroll now

What's inside

Syllabus

Course Overview
Lateral Movement with Infection Monkey
Resources

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Develops skills in lateral movement, network discovery, and credential compromise techniques, which are core skills for security professionals
Taught by Maril Vernon, who are recognized for their work in cybersecurity
Examines lateral movement within a network, which is a critical skill for defenders
Leverages tools like Infection Monkey for practical testing
Requires some prior knowledge of cybersecurity and networking
Focuses on testing against MITRE ATT&CK, which may not be relevant to all organizations

Save this course

Save Lateral Movement with Infection Monkey to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Lateral Movement with Infection Monkey. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Lateral Movement with Infection Monkey will develop knowledge and skills that may be useful to these careers:
Cyber Threat Analyst
A Cyber Threat Analyst studies cyber threats and develops threat intelligence reports. They monitor for, track, and analyze security breaches and vulnerabilities. Armed with the skills from a \"Lateral Movement with Infection Monkey\" course, a Cyber Threat Analyst can use hands-on knowledge of a real propagating payload, network discovery, and credential compromise techniques to inform and improve their analytical approaches and deliver more actionable, impactful reports.
Network Security Engineer
Network Security Engineers design, implement, and maintain security measures for computer networks and systems. The \"Lateral Movement with Infection Monkey\" course can help a Network Security Engineer by providing practical experience with network segmentation and lateral movement testing against known MITRE tactics. This will build a foundation to employ refinements to better test the efficiency of their security measures.
Cybersecurity Consultant
Cybersecurity Consultants evaluate and implement security measures for businesses of all sizes. Armed with the skills from the \"Lateral Movement with Infection Monkey\" course, a Cybersecurity Consultant can better assess network vulnerabilities, identify weaknesses, and test security controls. This will help them provide more effective guidance to their clients.
Penetration Tester
Penetration Testers use their skills to identify and exploit vulnerabilities in computer systems and networks. By taking a \"Lateral Movement with Infection Monkey\" course, Penetration Testers can gain hands-on experience with a real propagating payload and learn how to test for lateral movement and network segmentation against known MITRE tactics. This will enhance their ability to evaluate the effectiveness of security measures and improve their testing methodologies.
Vulnerability Assessment Analyst
Vulnerability Assessment Analysts identify, analyze, and prioritize security vulnerabilities in computer systems and networks. By taking a \"Lateral Movement with Infection Monkey\" course, Vulnerability Assessment Analysts can gain hands-on experience with a real propagating payload and learn how to test for lateral movement and network segmentation against known MITRE tactics. This will give them practical knowledge to apply in their assessments and allow them to deliver more comprehensive and actionable reports.
Incident Responder
Incident Responders are responsible for handling security breaches and incidents. By taking a \"Lateral Movement with Infection Monkey\" course, Incident Responders can gain hands-on experience with a real propagating payload and learn how to test for lateral movement and network segmentation against known MITRE tactics. This will allow them to more effectively prioritize and respond to security incidents.
Security Analyst
Security Analysts monitor and analyze security events and data to identify and respond to threats. The \"Lateral Movement with Infection Monkey\" course can help a Security Analyst by providing foundational knowledge of lateral movement testing and network segmentation against known MITRE tactics. This will aid them in developing and implementing stronger security measures and more effectively detecting and responding to threats.
Information Security Analyst
Information Security Analysts plan and implement security measures to protect an organization's information systems and data. By taking a \"Lateral Movement with Infection Monkey\" course, Information Security Analysts can gain hands-on experience with a real propagating payload and learn how to test for lateral movement and network segmentation against known MITRE tactics. This will contribute to more informed and effective security planning and implementation.
Red Team Operator
Red Team Operators simulate cyberattacks to test the effectiveness of an organization's security measures. By taking a \"Lateral Movement with Infection Monkey\" course, Red Team Operators can gain hands-on experience with a real propagating payload and learn how to test for lateral movement and network segmentation against known MITRE tactics. This will allow them to develop more realistic and effective attack simulations.
Blue Team Operator
Blue Team Operators defend against cyberattacks and protect an organization's information systems and data. By taking a \"Lateral Movement with Infection Monkey\" course, Blue Team Operators can gain hands-on experience with a real propagating payload and learn how to test for lateral movement and network segmentation against known MITRE tactics. This will allow them to develop and implement more effective defense strategies.
Cloud Security Architect
Cloud Security Architects design and implement security measures for cloud computing environments. While the \"Lateral Movement with Infection Monkey\" course focuses on on-premises networks, the principles and techniques learned can be applied to cloud environments as well. This course can help Cloud Security Architects better understand lateral movement and network segmentation in the cloud, which can be valuable knowledge for designing and implementing effective cloud security measures.
Security Architect
Security Architects design and implement security measures for computer systems and networks. By taking a \"Lateral Movement with Infection Monkey\" course, Security Architects can gain hands-on experience with a real propagating payload and learn how to test for lateral movement and network segmentation against known MITRE tactics. This will allow them to design and implement more effective security architectures.
IT Security Manager
IT Security Managers oversee and manage the security of an organization's information systems and data. The \"Lateral Movement with Infection Monkey\" course may be useful for IT Security Managers who want to gain a deeper understanding of lateral movement testing and network segmentation against known MITRE tactics. This knowledge can help them make more informed decisions about security investments and policies.
Cybersecurity Engineer
Cybersecurity Engineers design, implement, and maintain security measures for computer systems and networks. The \"Lateral Movement with Infection Monkey\" course may be useful for Cybersecurity Engineers who want to gain hands-on experience with a real propagating payload and learn how to test for lateral movement and network segmentation against known MITRE tactics. This knowledge can help them make more informed decisions about security investments and policies.
Systems Administrator
Systems Administrators manage and maintain computer systems and networks. The \"Lateral Movement with Infection Monkey\" course may be useful for Systems Administrators who want to gain a deeper understanding of lateral movement testing and network segmentation against known MITRE tactics. This knowledge can help them make more informed decisions about security investments and policies.

Reading list

We've selected seven books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Lateral Movement with Infection Monkey.
Provides a comprehensive overview of blue team techniques and methodologies. It valuable resource for anyone interested in learning more about network security.
Provides a comprehensive overview of the Metasploit framework. It valuable resource for anyone interested in learning more about penetration testing.
Provides a comprehensive overview of gray hat hacking techniques. It valuable resource for anyone interested in learning more about ethical hacking.
Provides a comprehensive overview of social engineering techniques. It valuable resource for anyone interested in learning more about the human element of security.
Provides a comprehensive overview of cryptographic engineering. It valuable resource for anyone interested in learning more about the latest security trends.
Provides a comprehensive overview of network security for beginners. It valuable resource for anyone interested in learning more about the basics of network security.
Provides a comprehensive overview of ethical hacking. It valuable resource for anyone interested in learning more about the basics of ethical hacking.

Share

Help others find this course page by sharing it with your friends and followers:
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser