BlackHillsInfoSec – Windows Post Exploitation BootCamp

BlackHillsInfoSec – Windows Post Exploitation BootCamp
English | Tutorial | Size: 3.72 GB


Kyle Avery started with Black Hills Information Security (BHIS) as an intern in October 2020 and was hired on as a full-time Penetration Tester in December 2020.

Pluralsight – Assessing Red Team Post Exploitation Activity

Pluralsight – Assessing Red Team Post Exploitation Activity
English | Tutorial | Size: 304.91 MB


In this course, you will explore the mindset and techniques used by red team operators and common cyber adversaries, and the ways the defensive teams can detect and even get ahead of these malicious actions.

Pluralsight – Post Exploitation with PowerShell

Pluralsight – Post Exploitation with PowerShell
English | Tutorial | Size: 241.77 MB


After gaining access to a server in a red team engagement, your next step is to escalate your privileges and establish persistence. This course will teach you post-exploitation techniques with PowerShell.

INE – Host & Network Penetration Testing: Exploitation

INE – Host & Network Penetration Testing: Exploitation
English | Tutorial | Size: 10.03 GB


Exploitation consists of the tactics, techniques, and procedures that attackers/adversaries utilize to gain an initial foothold on a target system and consequently the target network.