Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Certified Red Team Expert - A Complete Training With Real World Attacks
1.Introduction
1.Course Introduuction (1:16)
New Lecture
2.THE 3 TEAMS
Module Overview - The 3 Teams (1:27)
The Blue Team (5:45)
The Purple Team (7:40)
The Red Team (10:01)
3.PENETRATION TESTING PROCESS
1.Penetration Testing Process - Module Overview (3:39)
2.Penetration Testing Methodology (8:11)
3.Metrics & Why They Are Important (12:05)
4.Metrics
5.Routine Assessments Part 1 - What Are Routine Assessments (4:25)
6.Routine Assessments Part 2 - Yearly Assessments (5:28)
7.Routine Assessments Part 3 - Quarterly Assessments (9:17)
8.Routine Assessments Part 4- Monthly Assessments (4:31)
9.Routine Assessments Part 5 - Constant Assessments (8:11)
10.Routine Assessments Part 6 - Building an Assessment Plan (7:21)
11.Assessment Template
12.Building & Working with an Enterprise Budget (12:15)
13.Budget Sample
14.Budget Template
15.Specialties (3:58)
16.The CIA Triangle (3:09)
4.THE WINDOWS OPERATING SYSTEM
1.Installing & Using VirtualBox for Lab Virtualization (10:41)
2.Windows at a Glance (22:20)
3.The Windows File System (11:42)
4.Windows Logs (10:50)
5.WINDOWS INTERNALS
1.Windows Internals - UAC (8:38)
2.Windows Internals - Permissions (16:45)
3.Windows Internals - Alternate Data Streams (8:44)
4.Windows Internals - API Calls (12:35)
5.Windows Internals - The SID (6:11)
6.Windows Internals - Tokens (7:49)
7.Windows Internals - Named Pipes (6:01)
8.Windows Internals - PE Files & DLLs (16:08)
6.WINDOWS COMMAND LINE
1.Windows Command Line - Accessing the Command Line (4:56)
2.Windows Command Line - Navigation (7:04)
3.Windows Command Line - Working with Files and Directories (7:31)
4.Windows Command Line - Working with Pipes (9:32)
5.Windows Command Line - Standard IOE (3:56)
6.Windows Command Line - Managing Windows (12:07)
7.THE LINUX OPERATING SYSTEM
1.Where is the GUI (3:50)
2.The Linux File System (5:39)
3.Linux Command Line - Navigation (4:27)
4.Linux Command Line - Working with Files and Directories (8:42)
5.Linux Command Line - Standard IOE Recap (3:48)
6.Linux Command Line - Working with Data (13:32)
7.Linux Command Line - Working with File Permissions (9:39)
8.Linux Command Line - Man Pages (3:39)
9.Linux Command Line - Base64 (2:56)
10.Linux Command Line - Hex (6:26)
11.Linux Command Line - Network Connections Recap (3:58)
12.Linux Processes (13:00)
13.What are INodes (4:30)
14.Working with Open Files (6:38)
15.Symbolic Links (5:49)
16.The IDs (2:58)
17.Linux Pipes (3:19)
18.Linux Run Levels (3:49)
19.Linux Logs (3:43)
8.OPERATING SYSTEM INTERNALS
1.The Kernel (11:10)
2.One Ring to Rule Them All (5:40)
3.What is a CPU (2:40)
4.The CPU Registers (9:16)
5.The CPU Flags (2:08)
6.What is Memory & How does it work (3:35)
7.The Stack (5:46)
8.The Heap (3:23)
9.Extra information on Memory (4:06)
10.Debuggers (5:10)
11.Taking a look at ASLR (3:22)
12.A Quick Word About AntiVirus (5:13)
9.ACTIVE DIRECTORY
1.What is Active Directory (5:39)
2.Basic Windows Server Configuration (7:01)
3.Install AD DS (9:08)
4.The AD Tree (9:41)
5.OU's and their Permissions (6:31)
6.Managing Users and Groups (5:00)
7.Adding Machine to the Domain (6:59)
8.Setting up Group Policies (11:32)
9.Cached Credentials (2:34)
10.KERBEROS
1.What is Kerberos (3:41)
2.Kerberos Realms (1:41)
3.The Authentication Server (3:32)
4.The Ticket Granting Server (6:48)
11.DATA MANIPULATION
1.What is Encryption (3:24)
2.Symmetric Encryption (3:39)
3.Asymmetric Encryption (5:02)
4.RSA Encryption (2:07)
5.AES Encryption (1:42)
6.What is Hashing (3:06)
7.MD5 Hashing (2:34)
8.SHA Hashing (4:28)
9.What is Encoding (2:08)
10.Base64 Encoding (4:06)
11.Hex Encoding (4:24)
12.URL Encoding (2:52)
13.What is Compression (3:04)
14.Lossless vs Lossy Compression (3:08)
15.LZ77 & LZ78 Compression Algorithms (2:03)
16.Data Manipulation - Hands On (1:54)
12.NETWORKING
1.What is Networking (8:16)
2.The OSI Model (5:20)
3.TCPIP (9:56)
4.UDP (2:38)
5.The Switch (4:07)
6.Routers & Gateways (6:08)
7.What is a Protocol (1:26)
8.ICMP (6:00)
9.DNS (8:12)
10.DHCP (6:03)
11.ARP (4:33)
12.What is an IDS (3:30)
13.What is an IPS (4:45)
14.What is HA (4:35)
15.Proxys (3:17)
16.The DMZ (2:36)
17.Quick Talk on Databases (4:17)
13.VPNS
1.What is a VPN (2:35)
2.What is IPSEC (8:31)
3.What is IKE (6:28)
14.FIREWALLS
1.What is a Firewall (4:02)
2.Packet Filtering Firewalls (1:17)
3.Stateful Inspecting Firewalls (2:33)
4.Web Application Firewalls (2:00)
15.CONFIGURING PFSENSE FIREWALLS
1.Installing PFSense (8:06)
2.The Firewall UI (9:30)
3.Configuring a DMZ (7:17)
4.Configuring a VPN (6:38)
5.Backup & Logging (4:39)
6.PFsense Hands On (2:11)
16.PROGRAM THEORY
1.What is a Compiler (3:50)
2.What is a Linker (4:31)
17.PYTHON COURSE
1.Why Python (3:45)
2.Installing Python (3:37)
3.Hello World (6:46)
4.Variables (7:41)
5.Type Casting (4:55)
6.Operators (4:41)
7.IfElse (13:28)
8.Loops (8:38)
9.The Dictionary (9:42)
10.Lists (10:20)
11.Tuples (4:12)
12.Modules (6:06)
13.Classes (11:37)
14.Inheritance (14:30)
15.Configuration Files (5:00)
16.Logging (6:50)
17.Error Handling (6:58)
18.Sockets (11:14)
19.Threading (7:03)
20.Python Hands On (2:32)
18.ASSEMBLY COURSE
1.Why Assembly (1:50)
2.HelloWorld ASM (16:04)
3.Variables (7:41)
4.Saving States (10:23)
5.Arithmetic (20:49)
6.Loops_asm (4:50)
7.Logic (10:36)
8.ReadingFiles (11:42)
9.WritingFiles (6:28)
10.OP Code (6:16)
11.Bit Operators (3:37)
12.Assembly Hands On (1:25)
19.SCOPE IDENTIFICATION
1.Goal and Scope Identification (5:58)
2.Stability Considerations (7:10)
3.Briefing Stake Holders (2:21)
4.Prepping (2:58)
5.Scope Identification Hands On (2:07)
20.RECONNAISSANCE
1.What is Reconnaissance (3:49)
2.Installing Kali (6:33)
3.Passive Recon - Google (9:35)
4.Passive Recon - Shodan (5:20)
5.Passive Recon - Whois (6:48)
6.Passive Recon - Netcraft (7:18)
7.Passive Recon - Job Posting (7:27)
8.Active Recon - Port Scanning (21:46)
9.Active Recon - DNS (8:27)
10.Active Recon - Nikto (6:12)
12.Active Recon - Sparta (8:24)
11.Active Recon - Dirb (4:41)
13.Active Recon - Working with NC (13:11)
14.Active Recon - Banner Grabbing (7:23)
15.Active Recon - Vulnerability Scanners (4:49)
16.Active Recon - Browsing (6:20)
17.Active Recon - Manual vs Automated (4:04)
18.Reconnaissance Hands On (1:33)
21.EXPLOITATION
1.Finding Exploits (10:45)
2.Misconfigurations (3:47)
3.Looking for 0 days (4:18)
4.What is Metasploit (8:18)
5.Metasploit - Exploits and Payloads (15:29)
6.Metasploit - The Meterpreter (13:51)
7.Metasploit - Adding an Exploit to Metasploit (10:12)
8.Metasploit - MSFVenom (7:59)
9.Metasploit - Hands On (3:00)
10.The OWASP Top 10 (7:46)
11.SQL Injection-SQLMap (30:15)
12.XSS (13:25)
13.Insecure Direct Object Reference (5:37)
14.Local File Inclusion (11:29)
15.Remote File Inclusion (8:31)
16.The Authenticated Unauthenticated Pages (5:13)
17.Broken Authentication and Session Management (7:47)
18.Faulty Redirects (3:41)
22.POST EXPLOITATION
1.Stabilizing Shells (14:04)
2.Breaking Out Of The Jail Shell (8:42)
3.What is Persistence (2:40)
4.Windows Persistence (10:18)
5.Linux Persistence (10:47)
6.What is Privilege Escalation (4:23)
7.OS Version (10:55)
8.Common Configuration Issues (12:12)
9.File Permissions (15:08)
10.MySQL (14:32)
11.Sudo (9:37)
12.Relative Path Sudo Binary (8:19)
13.Unquoted Service Path (14:31)
14.Service Misconfigurations (7:46)
15.LinuxPrivChecker (7:33)
16.Im Root Now What (2:53)
17.Pulling Hashes (9:33)
18.Pass The Hash (4:40)
19.SSH Keys (5:05)
20.Checking Logs (1:58)
21.Duel Homed Machines (2:00)
22.Network Traffic (7:19)
23.ARP Poisoning (7:08)
24.Web Servers (2:20)
26.Password Spraying (5:51)
25.Account Directory Attacks (3:53)
27.SSH Tunneling (12:15)
28.Pivoting (13:26)
23.PASSWORD CRACKING
1.What is Password Cracking (4:43)
2.John The Ripper (5:04)
3.Hashcat (6:33)
4.Rainbow Tables (5:12)
5.Password Cracking Hands On (1:22)
24.COVERING YOUR TRACKS
1.Why Cover Your Tracks (4:24)
2.Clearing Windows Logs (3:34)
3.Clearing Linux Logs (6:07)
4.Quick Talk on Logging (5:01)
5.Clearing Command History (8:51)
6.Persistent Backdoors (3:27)
7.The Clean Up (2:46)
8.Covering Your Tracks Hands On (0:49)
25.REPORTING
1.The Format (14:15)
2.Report Template
3.The Audience (4:08)
4.Business Risks on Findings (5:40)
5.Remediation Options (3:03)
6.Working With The Blue Team (2:06)
26.ATTACKING ACTIVE DIRECTORY (REALISTIC SCENARIO)
1.Reconnaissance (3:18)
2.Exploitation (4:17)
3.Post Exploitation (3:41)
4.Finding New Access (6:48)
5.Moving Up In The World (4:33)
6.Getting Domain Admin (8:05)
27.JOB HUNTING
1.The Resume (7:59)
2.Professional Email (4:51)
3.Certifications (12:25)
4.Personal Brand (11:13)
5.Searching for the Job (11:40)
6.Analyzing the Job Post (22:13)
7.Applying for the Job (4:30)
8.The Future Company (8:37)
9.Salary Requirements (12:16)
10.The Interview Process - The Screening Call (8:00)
11.The Interview Process - Prepping for the Technical Interviews (9:11)
12.The Interview Process - The Technical Screening Interview (10:46)
16.Congratulations (0:21)
13.The Interview Process - Prepping for the On Site Final Interview (4:31)
14.The Interview Process - The Onsite (5:55)
15.The Interview Process - The Offer (11:10)
Teach online with
2.Misconfigurations
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock