Course Description

Initial access refers to the crucial first step taken by cyber threat actors to gain unauthorized entry into a digital system or network. It marks the beginning of a cyber-attack, during which adversaries exploit vulnerabilities or employ various techniques to breach the perimeter defenses and establish a foothold within the target environment. This initial breach often serves as a gateway for further compromise, allowing attackers to execute their malicious objectives, such as exfiltrating sensitive data, deploying malware, or disrupting operations.

Get Started Now

Kindly choose the enrollment pricing option that suits you best. If you're enrolling as a group or need a custom plan, please contact us. We're here to help!

  • Initial Access and Anomaly Hunting

    Course Material + 40 hours of virtual lab access

    $100.00

    Buy Now
  • Initial Access and Anomaly Hunting

    Course Material - No virtual lab access

    $50.00

    Buy Now

Course Curriculum

    1. Required Files

    1. Introduction

    1. SIEM Lab Setup

    2. Server Setup

    3. Target Setup

    4. Local Testing Setup

    5. Theory

    1. Initial Access Payloads

    2. Macros

    3. Detecting Macros

    4. Example #1 - Macros

    5. Lab #1 - Macros

    6. Lab #1 - Macros - Solutions

    7. Stand Alone Scripts

    8. Example #2 - Stand Alone Scripts

    9. Lab #2 - Stand Alone Scripts

    10. Lab #2 - Stand Alone Scripts - Solutions

    11. LNK

    12. Detecting LNK

    13. Example #3 - LNK

    14. Lab #3 - LNK

    15. Lab #3 - LNK - Solutions

    16. CHM

    17. Example #4 - CHM

    18. Lab #4 - CHM

    19. Lab #4 - CHM - Solutions

    20. Brute Force

    21. Example #5 - Brute Force

    22. HTA

    23. Example #6 - HTA

    24. ISO

    25. ISO Exercise

    1. Anomaly Detection

    2. Scheduled Tasks

    3. Example #7 - Scheduled Tasks

    4. Lab #5 - Scheduled Tasks

    5. Lab #5 - Scheduled Tasks - Solutions

    6. Services

    7. Example #8 - Services

    8. Lab #6 - Services

    9. Lab #6 - Services - Solutions

    10. User Manipulation

    11. Example #9 - User Manipulation

    12. Lab #7 - User Manipulation

    13. Lab #7 - User Manipulation - Solutions

    14. Lab #8

About this course

  • $50.00
  • 46 lessons
  • 0 hours of video content

Learning Outcomes

After completing this course, you will learn the following:

  • Gain Insight into Initial Access Techniques

  • Develop Proficiency in Anomaly Detection

  • Enhance Incident Response Capabilities

  • Implement Proactive Security Measures

Technical Requirements

For the hands-on labs in this course

  • Internet Connection

  • Workstation with at least 16GB RAM and 100GB Disk Space

  • Operating System (Windows or Linux)

  • VirtualBox or VMWare (hypervisor)

What is next at Cyber 5W?

Add your email to the mailing list to get the latest updates

Thank You