To conduct an advanced attack, you need more than just a collection of simple scripts. In addition to talent, you need a large amount of managed and unmanaged code. The more code and resources that are required to conduct an engagement, the more time we need. Time is something we don’t have a lot of on an engagement.
Today, to be an advanced and effective attacker, you need to move fast, and that speed requires a move to a DevOps style of managing infrastructure and code. With cloud resources and APIs to manage these resources, the days of manual setup are long behind us.
Instructor: Ralph May
Course Length: 16 Hours
Tuition: $575 USD
This page is for the On-Demand version of this course. Please check our Live Events Calendar for any live presentations of this class currently scheduled.
Where do we get started? And how does it all work?
In this training, we learn the fundamentals of DevOps and how we can code our tactics, techniques, and procedures (TTPs). Coding TTPs allows for new tactics and improved OPSEC to be shared without the cost of knowledge transfer and manual setup. This class will introduce students to Terraform Ansible and Docker with the goal of writing TTPs to use and share.
In this class, we will learn the fundamentals of Terraform Ansible and Docker with an emphasis on how we can use these tools to code our TTPs. After we have the fundamentals, we will start coding and get comfortable with YAML and will review how to create resources and customize TTPs. Lastly, we will work through multiple labs and examples that you can take with you for your next engagement.
After having taken this course, students should have:
- A thorough understanding of advanced attack infrastructure
- A full methodology for building red team resources
- Instructions and sample code on how to build out full attack infrastructure and how to integrate TTPs.
Who Should Take This Course
- Penetration testers
- Red teamers
- Ethical hackers
- General security practitioners
Audience Skill Level
There is no particular skill level necessary to take this course.
Students should have general Windows / UNIX command line skills in order to complete all of the hands-on labs.
What Each Student Should Bring
- A credit card (You will be signing up for cloud service accounts such as Microsoft Azure and AWS. These services require a credit card for signing up.)
- Before registering, please check that both Amazon AWS and Microsoft Azure services are available in your country. (Note that if you cannot sign up for these services you will not be able to participate in the labs)
- A computer with:
- x86-compatible or x64-compatible 2.0 GHz CPU minimum or higher
- 8 GB RAM or higher required
- 40 GB available hard drive space
- Windows 10 (This training utilizes VMware Workstation Player to run two different VMs)
- Internet access
About Our On-Demand Courses…
Learn at your own pace with access to course content, lectures, and demos in the Antisyphon On-demand learning platform. Many courses are offered with lifetime access to the course and content updates. On-demand courses include content update alerts, access to dedicated support channels in the Antisyphon Discord server, a certificate of completion, and complimentary access to the Antisyphon Cyber Range*.
* Cyber Range access and other course features may vary from course to course. See the specific details for each course on its registration page.
Trainer & Author
Ralph May is a security analyst and penetration tester at Black Hills Information Security. Before joining BHIS, Ralph spent the last five years delivering penetration tests on a wide range of security assessments. These assessments include physical, wireless, network, social engineering, and full simulation red teams. Before focusing on security, Ralph worked as a system administrator and as a network engineer for both civilian and government employers. Ralph is a US Army veteran who previously worked with the United States Special Operations Command (USSOC) on information security challenges and threat actor simulations.
Ralph has contributed to multiple open-source security tools and spoken at numerous security conferences. He’s a lifelong learner and finds joy in discovering how technology truly works. When Ralph is away from the keyboard, he likes the outdoors, boating, exercising, and spending time with his family.