Red Team Ethical Hacking Beginner

Tips for conducting Red Team Post-Exploitation tactics on a Windows Domain
Red Team Ethical Hacking Beginner
File Size :
1.37 GB
Total length :
3h 1m

Category

Instructor

Chris Sikes

Language

Last update

3/2021

Ratings

4.4/5

Red Team Ethical Hacking Beginner

What you’ll learn

Learn the basics of Red Team Windows tactics
Learn basic Red Team Ethical Hacking topics
Advanced Windows commands
Hands-on Red Team tactics, techniques, and procedure (TTP) demos

Red Team Ethical Hacking Beginner

Requirements

Computer or Laptop capable of running virtual machines with access to internet
Familiarity with Metasploit
Familiarity with Windows Domains

Description

Acquire the knowledge to become a Red Team operator on Windows DomainsLearn how to do basic Post-Exploitation tactics on Windows Domains such as enumeration, lateral movement, local/remote effects, persistence, evasion, and much more!This course will teach you Red Team tactics in a very practical and hands-on approach! With over 30 lectures and 3 hours of video this course will get you the jump start you need to learn Red Team basics. Every lecture on a TTP (tactic, technique, and procedure) will demo commands you can follow on your own Windows lab environment. ** Grow your skills in Red Teaming to enhance your professional skills!The course will cover a wide range of topics, including:Red Team BasicsC2 SystemsBasic Administration CommandsEnumerationLocal and Remote EffectsLateral MovementPersistenceEvasionRegardless if you want to be a professional Red Teamer yourself, interested in some of the basics of how Post-Exploitation works once a user gets the right credentials or access token, and/or just curious and want to expand your knowledge of hacking and computers in general, this is the course for you. So what are you waiting for? Learn Red Teaming now to advance your professional career and/or knowledge!* Taught skills must only be used ethically for a professional red team or penetration testing job, or for general cyber awareness for better security practices

Overview

Section 1: Introduction

Lecture 1 Introduction

Lecture 2 Course Curriculum Overview

Section 2: Red Team Lab Setup [Optional]

Lecture 3 Red Team Lab Setup [Brief]

Lecture 4 Obtaining VirtualBox, Kali, and Windows [Brief]

Lecture 5 Domain Setup [Demo]

Section 3: Basics

Lecture 6 Intro to Red Teaming [Brief]

Lecture 7 Red and Blue Teams [Brief]

Lecture 8 MITRE ATT&CK [Brief]

Lecture 9 CMD, Powershell, WMIC, SchTasks, SCM [Brief]

Lecture 10 C2 Frameworks [Brief]

Lecture 11 Red Team Tools [Brief]

Lecture 12 Metasploit Payload Setup [Demo]

Section 4: Basic Administration Commands

Lecture 13 Linux Administration Commands [Demo]

Lecture 14 Windows Administration Commands [Demo]

Lecture 15 Windows Account Management [Demo]

Section 5: Enumeration

Lecture 16 Domain Enumeration [Demo]

Lecture 17 Host Enumeration [Demo]

Section 6: Local and Remote Effects

Lecture 18 Copy/Download/Upload [Demo]

Lecture 19 Local & Remote Taskkills [Demo]

Lecture 20 Local/Remote File Execution [Demo]

Lecture 21 Local/Remote Shutdown/Reboot/Logoff [Demo]

Section 7: Lateral Movement

Lecture 22 WMIC Lateral [Demo]

Lecture 23 Schtask Lateral [Demo]

Lecture 24 SCM Lateral [Demo]

Section 8: Persistence

Lecture 25 Registry Persistence [Demo]

Lecture 26 Schtask Persistence [Demo]

Lecture 27 SCM Persistence [Demo]

Lecture 28 WMI Persistence [Demo]

Lecture 29 Golden Ticket [Demo]

Section 9: Evasion

Lecture 30 Evasion 101 [Brief]

Lecture 31 Detecting Lateral [Demo]

Lecture 32 Sysmon Evasion [Demo]

Beginners to Ethical Hacking,Cybersecurity Professionals,Red Team Operators,Ethical Hackers,Penetration Testers,Security Engineers,System Administrators,Network Engineers,Security Engineers

Course Information:

Udemy | English | 3h 1m | 1.37 GB
Created by: Chris Sikes

You Can See More Courses in the IT & Software >> Greetings from CourseDown.com

New Courses

Scroll to Top