top of page
attacking and defending

The Evasion Lab [March 2026]

Learn to bypass defenses in modern enterprise environments. Delve deep into the techniques used to bypass endpoint countermeasures like EDRs, Sysmon, ETW, ASR, DSE and more. Earn the CETP certification.

Starts:  14th March 2026  Duration: 5 weeks
Recordings of live sessions included!

CERTIFICATE (CETP)-01.png

What You Will Learn

This bootcamp is designed to equip information security professionals with the expertise needed to bypass defenses in modern enterprise environments.
Throughout the course, you will learn about Windows Internals, reversing EDRs, bypassing  Microsoft Defender for Endpoint (MDE), Elastic EDR, Sysmon weaponizing kernel exploits for defense evasion and bypassing security controls like Protected Processes (PP), Process Protection Light (PPL), Digital Signature Enforcement (DSE), Attack Surface Reduction (ASR) rules and incapacitating Event Tracing for Windows (ETW) telemetry and a lot more.

evasion course tile.-01.png

​5 Live Sessions
4 Hrs Per Session
4 Weeks Access
50 Flags To Be Collected
26 Lab Exercises
1 CETP Attempt
Recordings Of Live Sessions

Cracked Concrete Wall

Build Your Cybersecurity Credentials

Become a Certified Evasion Techniques Professional (CETP)

A Certified Evasion Techniques Professional (CETP) has the skills to understand, analyze, and exploit the intricacies of Windows and EDR internals, using reverse-engineering tools like IDA Pro and WinDbg. They can successfully write and deploy custom rootkits, and exploit vulnerable drivers to evade defenses.

Bootcamp Completion Certificate

Attendees will also get a course completion certificate after completing Learning Objectives covered during the course.

CERTIFICATE (CETP)-01.png

Live Session Schedule

Weekly 4 hours sessions start at 10:00am ET and end at 02:00pm ET.

DATE
LIVE SESSIONS
14 March 2026
Windows Internals, EDR Internals, Static Detection Bypass, Initial Access Techniques
21 March 2026
Introduction to Windows Kernel Programming, Road to Kernel, EDR Killing, Attack on EDR's Kernel Callbacks
28 March 2026
Attack on ETW, PP & PPL Bypass, Extra Offensive Rootkit Techniques
04 April 2026
C2 Traffic Tunneling, Block EDR's Traffic, ASR rules Bypass
11 April 2026
Attack on Sysmon, UAC Bypass, Anti-Analysis
Cracked Concrete Wall

Prerequisites

1. Ability to use command line tools.
2. Understanding of Windows API is a plus but will be covered in the class
3. Basic programming knowledge in C and Python is a plus but relevant code will be covered in the class

Bootcamp Syllabus

Bootcamp Syllabus

The course is split in four modules across five weeks:

Image by Gabriella Clare Marino

Module I

Understand User-mode and Kernel-mode presentation of a process, PE structure, User-mode and Kernel-mode Separation and Execution flow using IDA Pro and WinDbg

Reversing EDR's Internals using IDA Pro and WinDbg and how EDR's Telemetries are collected

Using Obfuscators & Code Virtualization to protect your code against static detection, analyzing, reverse-engineering

Signed ClickOnce Backdooring

Understand how a process can communicate with driver from userland. Create your own User-mode code that send and receives data from kernel driver

Image by Gabriella Clare Marino

Module II

Reversing R/W kernel primitive Vulnerable driver and exploit it to Load unsigned code to kernel using IDA Pro. Learn methodology to hunt for Leaked Certificate and how to leverage outdated Certificate to sign your rootkit

Learn methodology to hunt for signed Killer driver, Reversing multiple Killer drivers using IDA Pro. Exploit Killer drivers to kill EDR's processes and writing your own Killer rootkits

Understanding & Reversing Kernel Callbacks using WinDbg and IDA Pro, what telemetries Kernel Callbacks is collecting and for what purpose is used. Writing your own user-mode code and kernel driver toolkit to enumerate and remove kernel callbacks. Exploiting R/W kernel primitive vulnerable driver to enumerate and remove kernel callbacks

Image by Gabriella Clare Marino

Module III

Understanding & Reversing ETW Internals.Disabling ETW Providers

Understanding & Reversing Process Protection Level using WinDbg. Exploiting R/W kernel primitive vulnerable driver to manage process's Protection Level. Writing your own user-mode code and kernel driver toolkit to manage process's protection level. Dumping LSA protected LSASS

Hide Processes/Drivers from analysts and user-mode processes. Hide Kernel functions from the Import Address Table. Learn efficient dynamic kernel offsets resolving

Write your own Data Exfiltration tool that hide Malicious Traffic inside multiple trusted APIs like Slack

Image by Gabriella Clare Marino

Module IV

Discover & code multiple ways to prevent EDR's processes from sending alerts to SOC's management consoles

Reversing ASR rules and bypassing them

Understanding & Reversing Sysmon. Discover & Code multiple ways to blind Sysmon

Discover multiple ways to bypass Windows User Account Control

Discover & Code multiple Anti-Debugging/Anti-Disassembling/Anti-Virtualization/Anti-Sandbox/Anti-Code Injection techniques

Image by Stepan Sargsyan

Purchase Options

Anchor 1

Bootcamp

​30 DAYS LAB ACCESS
+
BOOTCAMP
+
LIFE TIME ACCESS TO COURSE MATERIAL
+
​ONE CERTIFICATION EXAM ATTEMPT

$499

Extension

30 DAYS
LAB EXTENSION
+
ONE COMPLEMENTARY EXAM ATTEMPT

$349

Bootcamp

​60 DAYS LAB ACCESS
+
BOOTCAMP
+
LIFE TIME ACCESS TO COURSE MATERIAL
+
​ONE CERTIFICATION EXAM ATTEMPT

$699

Bootcamp

​90 DAYS LAB ACCESS
+
BOOTCAMP
+
LIFE TIME ACCESS TO COURSE MATERIAL
+
​ONE CERTIFICATION EXAM ATTEMPT

$899

Exam Reattempt is only for existing or past students of this course who have already purchased this course in the past.

Reattempt


EXAM
REATTEMPT


 

$99

Add to cart

.

Purchase includes : 30 days lab access + course material + one certification exam attempt

Manthan Chhabra

MEET THE INSTRUCTOR

Manthan is a security researcher at Altered Security with a strong passion for enterprise security, red teaming and Active Directory security. He specializes in testing enterprise security defences with a deep understanding of offensive strategies, including EDR evasion and Active Directory attacks.
He continuously researches emerging threats, attack techniques, and mitigation strategies to stay ahead of evolving adversaries.

 

Can't attend this bootcamp?
Get informed about future bootcamps!

Thanks for subscribing!

bottom of page