Advanced Threat Actor Simulation (ATAS)

Actions Panel

Advanced Threat Actor Simulation (ATAS)

Red Team Training, Advanced Threat Actor Simulation (ATAS)

When and where

Date and time



Refund Policy

Refunds up to 7 days before event
Eventbrite's fee is nonrefundable.

About this event

Course information

This course aims to train an already inquisitive mind on how to operate and simulate real-world threat actors. This fast paced highly intensive course will teach candidates an in-depth methodology and approach, while operating as a professional red teamer. This course does not only show how to perform advanced tactics, techniques and procedures (TTP’s) but further covers how to run a successful end-to-end engagement with a focus on operational security and risk.

Here is a quote from one of our recent delegates who attended our online training course - “The training team provided unprecedented access to lessons from the front line that cannot be extracted from books, blogs and training materials or other courses” – Dan Stewart, Head of Testing at Quorum Cyber

What is included?

The tactics and techniques taught in this course are constantly updated and adapted to keep up-to-date with the latest techniques used by known threat actors in the wild. The latest TTPs being used by real-world threat actors will be demonstrated on a practical level. This includes stealthily bypassing defensive security controls (Common EDR’s and next gen AV), which are typically operating within modern enterprise environments and the pitfalls and lessons learned through many engagements and built-up experience across our red team. The instructors will impart knowledge from the field including wins, losses, improvements, optimisations and most importantly operational security.

The course includes both a theory element as well as hands on practical exercises, where the techniques learned can be practiced in a training lab environment specifically designed to replicate a typical corporate network. While the course focuses heavily on the latest offensive techniques used by a red team, it also covers common defensive techniques that are deployed by the blue team, such as host-based event logging and monitoring, strict egress filtering, application whitelisting and various other endpoint protections, such as EDR and next generation AV.

The course is four days long, broken down into three days of teaching, including four structured sessions a day mixed with multiple labs and demo’s after each session. The following breakdown outlines an overview of the course with some highlights detailed per-session. The final day concludes the training and allows you to bring all your accumulated knowledge to the test and simulate this in a real-world assault course.


Session 1: Introduction / C2 Proxy and Supporting Infrastructure Setup

• Cyber Kill Chain, Scoping & Pre-Engagement, Legal & Ethics, Reconnaissance & OSINT, Threat Intelligence

• C2 architecture, Rewrite Rules, Controlling Traffic and User Behaviour & Red Team Monitoring

Session 2: Domain Fronting and Proxy Reputation

• Purchasing collateral, Staying Anonymous, Fronting and Domain Reputation

• Certificates, Phishing, Email Security, Information Leakage and Burners

Session 3: C2 Communications / Implant Configurations

• C2 communication, C2 safety and Operational security

• Inner Workings of an Implant, Security Bypasses and Defensive Considerations (AMSI, ETW, Hooking etc)

Session 4: C2 Frameworks & Introduction to PoshC2

• Overview of many C2 Frameworks

• Introduction to PoshC2


Session 1: Weaponization

• Weaponization Handlers, Macro Embedded Office Documents / Excel4.0 SLK, OLE (Office 2013 / Office 2016+)

• Windows Script Hosting (JS&HTA), ClickOnce / Java applets and Document and Application Signing

Session 2: Download Cradles

• Downloaders, One Liners and Code snippets

Session 3: Execution

• Bypassing Whitelisting, Custom C++/C# Droppers and AMSI/ETW Bypass Techniques

Session 4: Mac OS X Execution & Delivery

• Phishing, Social Engineering, USB, Network Devices & Physical

• Delivery Evasion (HTML smuggling), Delivery Tracking and Live Experiences


Session 1: Situational Awareness & Persistence

• Understanding your Environment, Finding hidden defensive products

• Laying Persistence, Advanced Persistence & Custom Droppers

Session 2: Privilege Escalation / Active Directory Attacks

• Host Based Attacks, Elevating Privileges, Network Attacks

• Active Directory Attack (Kerb / Deleg etc), ACL Abuse Common Vulnerabilities

Session 3: Active Directory Trusts / Cloud Tenancy and Lateral Movement

• Understanding Trusts, Attacking Trusts and Hybrid Cloud Environment

• Common Lateral Movement Techniques, Stealth and Advanced Methods

Session 4: Database Intrusion / Memory Abuse

• Attacking Databases, Common Weaknesses and Interacting through C2

• Stealing Data from Memory and other Commonly Found Memory Artefacts


Assault Course

The training lab environment is built with defensive security controls and countermeasures deployed, which will require the candidates to use their newly acquired skills to bypass them.

The aim of the assault course is to run a red team assessment with an objective of penetrating the BLOREBANK network, including its defenses via phishing, then abusing many typical weaknesses (such as those highlighted throughout the course) with the ultimate objective of gaining access to a critical non-domain joined and segregated database server to retrieve credit card information.

Key Points / Objectives

• Perform a simulated phishing attack against a typical corporate environment with standard defenses, such as EDR (Microsoft Defender and Kaspersky), mail filtering and AppLocker restrictions (use the knowledge you have gained through the course to obtain a foothold).

• Perform situational awareness and lay persistence to secure your initial foothold. Users are simulated and may reboot their workstations from time to time to ensure they have the latest updates.

• Perform reconnaissance against a multi-domain environment and attempt to enumerate Active Directory and find any vulnerabilities that may or may not exist within the environment, keeping OpSec in mind.

• Attempt privilege escalation on-host and against the environment using your C2 framework of choice and aim to perform multi-layered network pivoting to access multiple targets in a highly monitored network.

• Enumerate the target objective and attempt to compromise the critical system in scope for the red team. This will include multiple levels of privilege escalation and lateral movement in order to gain access to the objective system.

How is the training conducted?

This training is conducted remotely utilising cloud based infrastructure to support the deployment of a complex and real life lab. The course comprises a fast paced and comprehensive syllabus delivered by multiple instructors and supported by many labs that will build on each phase of a red team, from preparation to execution.

Each Student will be presented with a copy of the training materials, lab guides and scripts. The training sessions will be conducted over Microsoft Teams while utilising Slack for comms, questions, polls and chatting before during and after the training is finished.


• Stable Internet Access (Internet connection is recommended to be over 5Mb download speed)

• Outbound SSH (TCP/22) and RDP Access (TCP/3389)

All student should have administrative rights over their laptop in order to install any software that may be required, e.g. putty or rdp client and have webcams and audio dial in via MS Teams.

Frequently Asked Questions (FAQs)

Can I contact the organiser before the start date to check I have all the prerequisites in place?

Yes of course, please direct all enquiries regarding the training via with a subject of training.

Will you get a PDF document with the slides and handouts for the course?

There is a watermarked PDF provided with every purchase of the course that will be e-delivered before starting the training. Each PDF handbook will be watermarked with the delegate’s full name and email address.

How do you access the labs for this course?

The labs for this course are all hosted online and will be accessible from any unfiltered internet connection. Each delegate will be provided their own virtual private servers (VPS) in the cloud to perform the exercises and corresponding final labs (1 x Windows and 1 x Linux).

Will the labs be online after the course has finished?

The labs will only be available for the duration of the course and then will be shutdown.

Can I use my own C2 framework for the labs?

This course is C2 framework agnostic and it's possible to use any tools that you wish to undertake the challenges and exercises, however, if the C2 framework is not known to the trainers they may not be able to provide support for the labs. Most common frameworks used for this training is PoshC2, Cobalt Strike, Empire & Covenant.

What software do I need to go on this course?

Please see the prerequisites above for more information. For any additional enquiries please contact us via with a subject of training.

Will we get a certificate for completion of this course?

Nettitude will send a digital certificate to all successful delegates that complete the training course.

Is there a minimum amount of delegates policy for this course?

Yes, Nettitude will provide a full refund to all delegates should this course not have the minimum amount of required delegates to be run.

What our students have said?

“The training team provided unprecedented access to lessons from the front line that cannot be extracted from books, blogs and training materials or other courses” – Dan Stewart – Former Head of Testing, Quorum Cyber

"Great course content delivered by extremely knowledgeable red teamers. The practical lab was a great environment where newly learned techniques can be applied" - Sasha Raljic - Principal Security Consultant

"Offers excellent value for penetration testing consultants wanting to increase their knowledge and skill. It taught real-world effective simulated attack strategies, tools and techniques which I now use to conduct simulated attacks against our clients" - Kai Stimpson - Principal Security Consultant"