- Payment Agreement
- › Our Cyber Training Courses
- Advanced Offensive Methodology & Analysis (A-OMA)
- Cyber Leader Course (CLC)
- Cyber Mission Foundations (CMF)
- Digital Forensics & Analysis (DFA)
- Mobile Digital Forensics (MDF)
- Offensive Methodology & Analysis (OMA)
- Windows & Linux Scripting (WLS)
- Windows Exploitation & Analysis (WEA)
- My Account
- Log In
- Class Alerts
- My Courses
November 18-22, 2019
Cost (single seat): $5,500
Course Length: 5 Days
Recommended for: Advanced Students
Pre-requisite: Offensive Methodology & Analysis course
Additional group and government discounts available. Contact Parrot Labs for more information!
Register for Course
To begin the registration process, click Register Here to complete our Payment Agreement. We will contact you to complete the process.
What will you get out of A-OMA?
Trains students in advanced cyber-attack methodologies against modern operating systems in order to develop strategies for protecting and defending networks and critical information. Classroom discussion and exercises focus on evading malware detection, advanced lateral movement in mixed-architecture environments, bypassing host-based firewalls, modern malware command and control techniques, and physical access methodologies.
What does Parrot Labs’ A-OMA course offer?
- Textbook and lab manual to accompany instruction
- Access to a personal sandboxed network with dozens of virtual machines, including switches, routers, firewalls and Unix and Windows systems
- Realistic target network with domains populated with simulated personal data to immerse students in detailed scenarios
What topics are covered in A-OMA?
- Learn to encode, encrypt and pack malware to evade detection
- Increase exploit effectiveness by modifying payloads and stagers to avoid detection
ADVANCED CREDENTIAL ATTACKS
- Perform pass-the-hash techniques with antivirus-evading payloads
- Learn to migrate between 32-bit and 64-bit payloads on Windows systems
- Explore alternative credential attacks used for lateral movement within a network
MALWARE COMMAND AND CONTROL
- Learn command and control techniques used by modern malware
- Employ beaconing malware to minimize detection
- Gain interactive access through a beaconing backdoor
HOST FIREWALL MANIPULATION
- Disable or manipulate host-based firewalls on exploited systems
- Enable lateral movement inside a target network
- Gain access to a system using a live-boot operating system
- Implant malware on a system compromised through physical access