KeyW is now part of Jacobs. Learn more about this exciting combination.

Advanced Offensive Methodology & Analysis (A-OMA)

Upcoming Courses

                    • June 1 – 5, 2020

                    • August 24 – 28, 2020

                    • November 2 – 6, 2020

Cost (single seat): $5,500

Course Length:  5 Days

Recommended for: Advanced Students

Pre-requisite: Offensive Methodology & Analysis course

Additional group and government discounts available. Contact Parrot Labs for more information!

Register for Course

To begin the registration process, click Register Here to complete our Payment Agreement. We will contact you to complete the process.

 Download Course Catalog

What will you get out of A-OMA?

Trains students in advanced cyber-attack methodologies against modern operating systems in order  to develop strategies for protecting and defending networks and critical information. Classroom discussion and exercises focus on evading malware detection, advanced lateral movement in mixed-architecture environments, bypassing host-based firewalls, modern malware command and control techniques, and physical access methodologies.


What does Parrot Labs’ A-OMA course offer?

  • Textbook and lab manual to accompany instruction
  • Access to a personal sandboxed network with dozens of virtual machines, including switches, routers, firewalls and Unix and Windows systems
  • Realistic target network with domains populated with simulated personal data to immerse students in detailed scenarios

What topics are covered in A-OMA?


  • Learn to encode, encrypt and pack malware to evade detection
  • Increase exploit effectiveness by modifying payloads and stagers to avoid detection


  • Perform pass-the-hash techniques with antivirus-evading payloads
  • Learn to migrate between 32-bit and 64-bit payloads on Windows systems
  • Explore alternative credential attacks used for lateral movement within a network


  • Learn command and control techniques used by modern malware
  • Employ beaconing malware to minimize detection
  • Gain interactive access through a beaconing backdoor


  • Disable or manipulate host-based firewalls on exploited systems
  • Enable lateral movement inside a target network


  • Gain access to a system using a live-boot operating system
  • Implant malware on a system compromised through physical access