Threat Intelligence: Requirements, Planning, Direction, and Review
Planning and designing a threat intelligence program is one of the most important skills of threat intelligence specialist. This course will teach you how to gather requirements, plan, design, direct and review a threat intelligence program. ...
Post Exploitation with Meterpreter
In a penetration test, escalating your privileges and exfiltrating data are some of the most important tasks of the assessment. This course will teach you how to use the Meterpreter tool for post-exploitation tasks. ...
Reconnaissance with Sn1per
Reconnaissance is one of the most important stages of a red team exercise. In this course, we cover the Sn1per tool, which allows you to perform passive and active reconnaissance against your target. ...
Defense Evasion with ProxyChains
Network security tools are the most common line of defense in a company. In this course, you will learn how to use ProxyChains to re-route your network traffic and bypass such security tools. ...
Reconnaissance with OWASP Amass
The first step on a red team exercise is the Reconnaissance phase. In this course we cover the OWASP Amass tool, which allows you to enumerate domains and find potential attack vectors on your target. ...
Privilege Escalation with Rubeus
After getting initial access to a domain, your job is to escalate privileges to get admin-level access. In this course, you will learn how to use Rubeus to perform two well-known privilege escalation attacks: Kerberoasting and AS-REP Roasting. ...
Planning and Scoping for CompTIA Pentest+
Your first task in a penetration test project is to define the scope and plan your engagement. This Pentest+ course teaches you how to identify testing requirements, assets in scope, legal boundaries, limitations, rules of engagement, and much more. ...
Information Gathering and Vulnerability Scanning for CompTIA Pentest+
Reconnaissance is one of the most important phases in a penetration testing engagement. This course will teach you how to perform information gathering and vulnerability scanning needed for the CompTIA Pentest+ certification. ...
Persistence with Impacket
Maintaining foothold of compromised servers is a key step during a red team engagement. In this course, you will learn persistence using Impacket. ...
Discovery with Seatbelt
After getting access to few servers in the environment your job is to discovery sensitive information about the environment. In this course, you will learn discovery using Seatbelt. ...
Privilege Escalation with SharpUp
After getting initial access to a machine, one of your main tasks is to escalate privileges to get admin access. In this course, you will learn privilege escalation using SharpUp. ...
Reporting and Communication for CompTIA Pentest+
Reporting is the last and one of the most important phases in a pentest. It is where you communicate our work to the client. This course will teach you the reporting and communication skills needed for the CompTIA Pentest+ exam. ...
Exam Review and Tips for CompTIA Pentest+
The CompTIA Pentest+ certification is one of the most valued pentest certifications on the market. This course will review the key concepts for the certification as well as provide study tips for the CompTIA Pentest+ certification. ...
Persistence with pwncat
During a red team engagement, it is crucial that you maintain foothold on your compromised servers. In this course, you will learn persistence using pwncat. ...
Network Discovery and Enumeration with PowerShell
PowerShell is a powerful tool that can help you to enumerate local and remote information during an offensive engagement. This course will teach you how to use PowerShell to perform reconnaissance in a red team scenario. ...
Impact with Caldera
Impact is the last step on a red team simulation, where adversaries cause disruption in the system to accomplish their objectives. In this course, you will learn impact using Caldera. ...