SEKTOR7 Institute/RTO: ALL-IN Pack

For Business and Teams

RED TEAM Operator: ALL-COURSE Bundle

  • $3,299

RTO: ALL-IN Pack

The pack contains all courses available in SEKTOR7 portfolio - the whole Malware Development series with additions of Windows Evasion, Persistence and Privilege Escalation courses. Learn a wide range of tactics each Red Team Operator should know.

Contents

RTO: Malware Development Essentials

  • 34 Lessons
  • 365-day access

A course on becoming a better ethical hacker, pentester and red teamer by learning offensive security tools development in Windows.

RTO: Malware Development Intermediate

  • 40 Lessons
  • 365-day access

More advanced offensive security tools (OST) development techniques in Windows, including: API hooking, 32-/64-bit migrations, reflective binaries and more.

RTO: Malware Development Advanced - Vol.1

  • 50 Lessons
  • 365-day access

Advanced offensive security tool (OST) development topics for Windows user land only, including: hidden data storage, rootkit techniques, finding privileged objects in system memory, detecting new process creation, generating and handling exceptions, building COFFs and custom RPC-like instrumentation, and more.

RTO: Malware Development Advanced - Vol.2

  • 43 Lessons
  • 365-day access

Advanced offensive security tool (OST) development for Windows kernel, including: kernel object manipulations, silencing EtW telemetry, obtaining and preserving READ+WRITE primitives in Windows kernel, and more.

RTO: Windows Evasion

  • 38 Lessons
  • 365-day access

Learn how to avoid modern endpoint protection technology with well known, less known and in-house developed techniques.

RTO: Windows Persistence

  • 37 Lessons
  • 365-day access

27 persistence methods in Windows. From basic to advanced, unique and used by nation-state threat actors.

RTO: Privilege Escalation in Windows

  • 34 Lessons
  • 365-day access

A course about breaking and bypassing Windows security model. Escalating privileges with 20 different techniques. From non-admin to SYSTEM.