University certificate
The world's largest faculty of information technology”
Why study at TECH?
You will contribute to improving Cybersecurity and prevent major digital crimes from occurring. Don't miss this opportunity and enroll!”
In the complex scenario of Cybersecurity, having an expert in this field presents itself as an imperative need for organizations looking to strengthen their defenses against constantly evolving threats. This proactive approach, fundamental to continuously improving the security posture, highlights the critical need for experts.
Implementing proactive measures is essential and Red Team's specialized knowledge provides professionals with the ability to actively anticipate, identify and mitigate vulnerabilities in systems and networks. In this Postgraduate diploma, the student will acquire skills in penetration testing and simulations, addressing the identification and exploitation of vulnerabilities. In this sense, they will not only develop advanced technical skills, but also foster effective collaboration with security teams, integrating strategies against malware threats.
In addition, the graduates will acquire a solid understanding of the fundamental principles of digital forensic investigation (DFIR), applicable in the resolution of cyber incidents. Furthermore, this comprehensive approach to the curriculum will ensure that professionals are equipped with cutting-edge skills in the field of Cybersecurity.
This academic pathway is distinguished not only by its content, but also by its advanced methodology. It will be available to students entirely online, giving them the flexibility they need to advance their careers without compromising their job responsibilities.
In addition, it will employ the Relearning methodology, consisting of the repetition of key concepts, is used to fix knowledge and facilitate effective learning. This combination of accessibility and robust pedagogical approach makes this Postgraduate diploma not only an advanced educational option, but also a significant driver for those seeking to excel in the field of Cybersecurity.
You will stand out in a sector with great projection thanks to this exclusive university program at TECH"
This Postgraduate diploma in Red Team Cybersecurity contains the most complete and up-to-date program on the market. The most important features include:
- The development of case studies presented by experts in Red Team Cybersecurity
- The graphic, schematic and practical contents with which it is conceived provide cutting- Therapeutics and practical information on those disciplines that are essential for professional practice
- Practical exercises where the self-assessment process can be carried out to improve learning
- Its special emphasis on innovative methodologies
- Theoretical lessons, questions to the expert, debate forums on controversial topics, and individual reflection assignments
- Content that is accessible from any fixed or portable device with an Internet connection
You will delve into detailed forensic reporting at the world's top-rated university by its students, according to the Trustpilot platform (4.9/5)"
The program’s teaching staff includes professionals from the field who contribute their work experience to this educational program, as well as renowned specialists from leading societies and prestigious universities.
The multimedia content, developed with the latest educational technology, will provide the professional with situated and contextual learning, i.e., a simulated environment that will provide immersive education programmed to learn in real situations.
This program is designed around Problem-Based Learning, whereby the professional must try to solve the different professional practice situations that arise during the academic year For this purpose, the students will be assisted by an innovative interactive video system created by renowned and experienced experts.
You will develop skills to evaluate and select anti-malware security tools"
Forget about memorizing! With the Relearning system you will integrate the concepts in a natural and progressive way"
Syllabus
This curriculum will offer students a specialized immersion in forensic analysis applied to malware, highlighting the development of key skills for the identification of indicators of compromise (IoC) and attack patterns. Throughout the syllabus, graduates will be immersed in advanced methodologies, providing them with the necessary tools and knowledge to face sophisticated cyber threats. Likewise, this rigorously structured program will guarantee a comprehensive training in the Red Team field, preparing professionals to analyze and counteract the complex strategies used by malicious actors.
You will delve into advanced post-exploitation techniques and position yourself as an outstanding Red Teamer"
Module 1. Malware Analysis and Development
1.1. Malware Analysis and Development
1.1.1. History and Evolution of Malware
1.1.2. Classification and Types of Malware
1.1.3. Malware Analysis
1.1.4. Malware Development
1.2. Preparing the Environment
1.2.1. Configuration of Virtual Machines and Snapshots
1.2.2. Malware Analysis Tools
1.2.3. Malware Development Tools
1.3. Windows Basics
1.3.1. PE file format (Portable Executable)
1.3.2. Processes and Threads
1.3.3. File System and Registry
1.3.4. Windows Defender
1.4. Basic Malware Techniques
1.4.1. Shellcode Generation
1.4.2. Execution of Shellcode on Disk
1.4.3. Disk vs Memory
1.4.4. Execution of Shellcode in Memory
1.5. Intermediate Malware Techniques
1.5.1. Persistence in Windows
1.5.2. Home Folder
1.5.3. Registration Keys
1.5.4. Screensaver
1.6. Advanced MalwareTechniques
1.6.1. Shellcode Encryption (XOR)
1.6.2. Shellcode Encryption (RSA)
1.6.3. String Obfuscation
1.6.4. Process Injection
1.7. Static Malware Analysis
1.7.1. Analyzing Packers with DIE (Detect It Easy)
1.7.2. Analyzing Sections with PE-Bear
1.7.3. Decompilation with Ghidra
1.8. Dynamic Malware Analysis
1.8.1. Observing Behavior with Process Hacker
1.8.2. Analyzing Calls with API Monitor
1.8.3. Analyzing Registry Changes with Regshot
1.8.4. Observing Network Requests with TCPView
1.9. Analysis in .NET
1.9.1. Introduction to .NET
1.9.2. Decompiling with dnSpy
1.9.3. Debugging with dnSpy
1.10. Analyzing Real Malware
1.10.1. Preparing the Environment
1.10.2. Static Malware Analysis
1.10.3. Dynamic Malware Analysis
1.10.4. YARA Rule Creation
Module 2. Forensic Fundamentals and DFIR
2.1. Digital Forensics
2.1.1. History and Evolution of Computer Forensics
2.1.2. Importance of Computer Forensics in Cybersecurity
2.1.3. History and Evolution of Computer Forensics
2.2. Fundamentals of Computer Forensics
2.2.1. Chain of Custody and Its Application
2.2.2. Types of Digital Evidence
2.2.3. Evidence Acquisition Processes
2.3. File Systems and Data Structure
2.3.1. Main File Systems
2.3.2. Data Hiding Methods
2.3.3. Analysis of File Metadata and Attributes
2.4. Operating Systems Analysis
2.4.1. Forensic Analysis of Windows Systems
2.4.2. Forensic Analysis of Linux Systems
2.4.3. Forensic Analysis of macOS Systems
2.5. Data Recovery and Disk Analysis
2.5.1. Data Recovery from Damaged Media
2.5.2. Disk Analysis Tools
2.5.3. Interpretation of File Allocation Tables
2.6. Network and Traffic Analysis
2.6.1. Network Packet Capture and Analysis
2.6.2. Firewall Log Analysis
2.6.3. Network Intrusion Detection
2.7. Malware and Malicious Code Analysis
2.7.1. Classification of Malware and Its Characteristics
2.7.2. Static and Dynamic Malware Analysis
2.7.3. Disassembly and Debugging Techniques
2.8. Log and Event Analysis
2.8.1. Types of Logs in Systems and Applications
2.8.2. Interpretation of Relevant Events
2.8.3. Log Analysis Tools
2.9. Respond to Security Incidents
2.9.1. Incident Response Process
2.9.2. Creating an Incident Response Plan
2.9.3. Coordination with Security Teams
2.10. Evidence and Legal Presentation
2.10.1. Rules of Digital Evidence in the Legal Field
2.10.2. Preparation of Forensic Reports
2.10.3. Appearance at Trial as an Expert Witness
Module 3. Advanced Red Team Exercises
3.1. Advanced Recognition Techniques
3.1.1. Advanced Subdomain Enumeration
3.1.2. Advanced Google Dorking
3.1.3. Social Networks and theHarvester
3.2. Advanced Phishing Campaigns
3.2.1. What is Reverse-Proxy Phishing?
3.2.2. 2FA Bypass with Evilginx
3.2.3. Data Exfiltration
3.3. Advanced Persistence Techniques
3.3.1. Golden Tickets
3.3.2. Silver Tickets
3.3.3. DCShadow Technique
3.4. Advanced Avoidance Techniques
3.4.1. AMSI Bypass
3.4.2. Modification of Existing Tools
3.4.3. Powershell Obfuscation
3.5. Advanced Lateral Movement Techniques
3.5.1. Pass-the-Ticket (PtT)
3.5.2. Overpass-the-Hash (Pass-the-Key)
3.5.3. NTLM Relay
3.6. Advanced Post-Exploitation Techniques
3.6.1. LSASS Dump
3.6.2. SAM Dump
3.6.3. DCSync Attack
3.7. Advanced Pivoting Techniques
3.7.1. What Is Pivoting
3.7.2. Tunneling with SSH
3.7.3. Pivoting with Chisel
3.8. Physical Intrusions
3.8.1. Surveillance and Reconnaissance
3.8.2. Tailgating and Piggybacking
3.8.3. Lock-Picking
3.9. Wi-Fi Attacks
3.9.1. WPA/WPA2 PSK Attacks
3.9.2. AP Rogue Attacks
3.9.3. Attacks on WPA2 Enterprise
3.10. RFID Attacks
3.10.1. RFID Card Reading
3.10.2. RFID Card Manipulation
3.10.3. Creation of Cloned Cards
Don't miss the opportunity to boost your career through this innovative program. Become an expert in Cybersecurity!”
Postgraduate Diploma in Red Team Cybersecurity
The digital revolution has fundamentally transformed society by facilitating instant communication, access to global information and process automation. This area impacts sectors such as the economy, education and health, being a key catalyst for innovation and progress in the contemporary era. To this end, TECH Global University, recognized for its academic excellence, invites you to immerse yourself in the Postgraduate Diploma in Red Team Cybersecurity, an online program that redefines your limits and prepares you to face the challenges of the digital world. The program immerses you in a rigorous syllabus, designed by academic experts and industry professionals, ranging from advanced techniques to strategies for assessing the resilience of systems to cyber threats. Imagine learning from a team of highly qualified faculty with practical experience in the field of cybersecurity. This program gives you the unique opportunity to gain knowledge directly from industry leaders, ensuring that every lesson is a window into the realities of cyberspace.
What's more, it's a unique opportunity to gain knowledge directly from industry leaders, ensuring that every lesson is a window into the realities of cyberspace.
Strengthen your skills with the world's best online university
What topics will you cover? From vulnerability analysis, to attack simulation, the program immerses you in this fascinating world, allowing you to thoroughly understand how ethical hackers identify and neutralize threats. Studying with us is more than an academic experience; it is an unparalleled opportunity to grow intellectually and forge professional connections that transcend borders. Delve into an environment that fosters innovation and challenges you to reach your full potential in the ever-changing cybersecurity landscape. Upon completion of this program, you'll earn a certificate that supports the knowledge you've acquired. What will you be able to work on completion? Doors open to leadership roles, where you'll be able to apply your skills to actively protect vital systems and data. Join this educational journey in the Postgraduate Diploma in Red Team Cybersecurity and prepare yourself to be an outstanding professional. Your digital future starts here!
Your digital future starts here!