Save for later

Assessing Red Team Post Exploitation Activity

Attackers can use some sophisticated and unsophisticated means to slip by external defenses and detections. Insider threat is on the rise and completely bypasses network or remote access inspection and authentication. As a pen-test progresses from the initial access phase into post-exploitation activity, you aim to understand what is being accomplished inside the network and how your internal defenses can accomplish a defense in depth posture. You ask the assessment team to explain not only what steps they are taking to operate inside your already compromised network but also how you can mitigate these capabilities in the future.
Get Details and Enroll Now

OpenCourser is an affiliate partner of Pluralsight and may earn a commission when you buy through our links.

Get a Reminder

Send to:
Rating Not enough ratings
Length 1.1 hours
Starts On Demand (Start anytime)
Cost $35/month (Access to entire library- free trial available)
From Pluralsight
Instructor Aaron Rosenmund
Download Videos On Windows, MacOS, iOS, and Android Pluralsight app
Language English
Subjects IT & Networking
Tags Security Professional

Get a Reminder

Send to:

Similar Courses

Careers

An overview of related careers and their average salaries in the US. Bars indicate income percentile.

Access Facilitator $41k

Access Representative 1 $42k

Financial Access $42k

Access Specialists $43k

Access Counselor $45k

Access Scheduler $51k

Supervisor Access $55k

Access Officer $62k

Access Delivery-Network Operations Analyst $65k

RAN (Radio Access Network) Engineer $66k

Access Network Engineer $115k

Network and Access Optimization Analyst/Circuit Designer 4 $137k

Write a review

Your opinion matters. Tell us what you think.

Rating Not enough ratings
Length 1.1 hours
Starts On Demand (Start anytime)
Cost $35/month (Access to entire library- free trial available)
From Pluralsight
Instructor Aaron Rosenmund
Download Videos On Windows, MacOS, iOS, and Android Pluralsight app
Language English
Subjects IT & Networking
Tags Security Professional

Similar Courses

Sorted by relevance

Like this course?

Here's what to do next:

  • Save this course for later
  • Get more details from the course provider
  • Enroll in this course
Enroll Now