At a Glance
There are five standard scenarios used within the Red Team Assessment. These being Endpoint Attack, Insider Threat, Data Exfiltration, WIFI Attack and Physical Breach.
Benefits
Download Datasheet

DATASHEETS
The objective is not to identify all security gaps, as you would in penetration testing, but to reach the end-goal, to compromise the crown jewels and show that the data can be exfiltrated by certain means.
There are five standard scenarios used within the Red Team Assessment. These being Endpoint Attack, Insider Threat, Data Exfiltration, WIFI Attack and Physical Breach.
A Checklist for Effective Threat Hunting
Explore an example strategy and hypothesis, followed by an examination on what to hunt for, a look into tracking threat hunting, what are the outputs of threat hunting, and an acknowledgement of the current limitations of threat hunting publicly available.
Security 101. Don’t Bash Your Head Over Unsecured Credentials
Adversaries can search the bash command history on compromised systems for insecurely stored credentials. Know how to stop this.