May 09, 2025  
2021-2022 Course Catalog 
    
2021-2022 Course Catalog [ARCHIVED CATALOG]

Add to Portfolio (opens a new window)

CVF 2131 - Threat Simulation

Credits: 4
Hours/Week:
Course Description: The most advanced hacking course offered, this course builds upon all other previous work and should be taken last by the student. The focus of this class is to explain and execute realistic threat simulations. These threat simulations include sophisticated adversary techniques such as building attack infrastructures, generating reliable payloads, bypassing corporate security controls, and collecting sensitive data on a compromised network. Hands-on labs will be heavily used throughout this course. This course includes how to articulate creative and unique solutions to these problems.
MnTC Goals
None

Prerequisite(s): CVF 2086  with grade of C or higher OR instructor consent.
Corequisite(s): None
Recommendation: None

Major Content
1. Building an Attack Infrastructure

  1. Command and Control
  2. Email Servers
  3. Payload Delivery
  4. Redirection Servers

2. Payload Creation

  1. MS Office Payloads
  2. Browser Payloads
  3. Non-Windows Payloads

3. Social Engineering

  1. Phishing
  2. Vishing
  3. Physical

4. Bypassing Security Controls

  1. Obfuscation
  2. Delay Timers
  3. Disabling Controls
  4. Anti-Forensics
  5. AV Evasion
  6. Web Proxies

5. Post Exploitation

  1. Pivoting Techniques
  2. Persistence
  3. Low and Slow Techniques

6. Data Collection

  1. Emails
  2. Clipboard
  3. Sensitive Files
  4. Data Exfiltration

7. Operational Security

  1. Blacklists
  2. Threat Intelligence
  3. Infrastructure Segmentation
  4. Adapting when caught

Learning Outcomes
At the end of this course, students will be able to:

1. explain how dedicated and advanced cybercriminals compromise and obtain information.

2. create example infrastructures to execute a coordinated attacks.

3. explain the different levels of sophistication of a targeted attack compared to commodity threats.

4. create robust threat simulation documentation.

5. identify and articulate creative solutions to help thwart or slow down sophisticated adversaries.

6. execute complex attack chains to accomplish a simulated adversary goal.

7. explain human weakness in security postures and how it can be exploited.

8. explain the evolving threat landscape and how agile cybercriminals adapt.

9. use techniques used by cybercriminals to bypass security controls commonly used by organizations.

10. create sample payloads to use in threat simulation exercises.

11. navigate and query a compromised environment for sensitive data.

12. explain how cybercriminals monitor good security controls to ensure they are not caught.
Competency 1 (1-6)
None
Competency 2 (7-10)
None


Courses and Registration



Add to Portfolio (opens a new window)