Emil Schmidth Nielsen
ebe8794f-baaf-46fe-b556-cff98fe133fc
2024-12-28
This certification validates the skills and knowledge acquired through the Assumed Breach Penetration Testing course, which is designed to equip the students with the expertise to identify and exploit vulnerabilities within a corporate infrastructure. The course gives an introduction to what Assumed breach penetration testing is, and what can be explored.
Certificate Of Completion
Name
Operation Mirror Maze
SagaLabs ApS
CVR: 44417537
Date of Issue

Distributed by:

Issued to

Emil Schmidth Nielsen

Want to report a typo or a mistake?

Credential Verification

Issue date: December 28, 2024

ID: ebe8794f-baaf-46fe-b556-cff98fe133fc

Issued by

SagaLabs

At SagaLabs, we aim to create a meaningful and engaging experience for our customers. Participating in our events will challenge your business to think creatively and act in complex scenarios.

Type

Training

Level

Intermediate

Format

Hybrid

Description

This certification validates the extensive skills and knowledge acquired through the Assumed Breach Penetration Testing course, which is designed to equip the students with the expertise to identify and exploit vulnerabilities within a corporate infrastructure. The course gives an introduction to what Assumed breach penetration testing is, and what can be explored.

Course Overview:
Participants engage in a simulated environment that mirrors real-world network scenarios, where they assume the role of a threat actor who has already breached the perimeter defenses.

Learning Objectives:

  • Command & Control (C2) Frameworks: Gain proficiency in using sophisticated C2 tools. Learn to establish control over compromised systems, manage payloads, and simulate attacker command channels in a controlled environment.

  • Network Enumeration and Lateral Movement: Master techniques for thorough network scanning and enumeration. Learn to move laterally across a network using compromised credentials, mimicking an attacker.

  • Credential Access: Acquire the ability to extract and manipulate user credentials. This includes performing attacks against the Active Directory for accessing high-value targets within a network.

  • Privilege Escalation: Implement strategies to gain higher-level access on compromised hosts.

Skills

Network Enumeration

Penetration Testing

Command and Control(C2)

Sliver C2

Earning Criteria

Other

Has to participate in the instructor-led course and complete all assignments.