- Payment Agreement
- › Our Cyber Training Courses
- Advanced Offensive Methodology & Analysis (A-OMA)
- Cyber Leader Course (CLC)
- Cyber Mission Foundations (CMF)
- Digital Forensics & Analysis (DFA)
- Mobile Digital Forensics (MDF)
- Offensive Methodology & Analysis (OMA)
- Windows & Linux Scripting (WLS)
- Windows Exploitation & Analysis (WEA)
- My Account
- Log In
- Class Alerts
- My Courses
November 18 – 22, 2019
Cost (single seat): $5,500
Course Length: 5 Days
Recommended for: Advanced Students
Additional group and government discounts available. Contact Parrot Labs for more information.
What will you get out of A-OMA?
This one-week course teaches students advanced cyber-attack methodologies against modern operating systems in order to develop strategies to protect and defend their networks and critical information.
What does Parrot Labs’ A-OMA course offer?
- Textbook and lab manual to accompany instruction
- Access to a personal sandboxed network with dozens of virtual machines, including switches, routers, firewalls and Unix and Windows systems
- Realistic target network with domains populated with simulated personal data to immerse students in detailed scenarios
What topics are covered in A-OMA?
- Learn to encode, encrypt and pack malware to evade detection
- Increase exploit effectiveness by modifying payloads and stagers to avoid detection
ADVANCED CREDENTIAL ATTACKS
- Perform pass-the-hash techniques with antivirus-evading payloads
- Learn to migrate between 32-bit and 64-bit payloads on Windows systems
- Explore alternative credential attacks used for lateral movement within a network
MALWARE COMMAND AND CONTROL
- Learn command and control techniques used by modern malware
- Employ beaconing malware to minimize detection
- Gain interactive access through a beaconing backdoor
HOST FIREWALL MANIPULATION
- Disable or manipulate host-based firewalls on exploited systems
- Enable lateral movement inside a target network
- Gain access to a system using a live-boot operating system
- Implant malware on a system compromised through physical access