Windows Red Teaming Course

Welcome to the Windows Red Teaming course! This engaging course equips you with the skills and knowledge needed to assess, secure, and defend Windows Active Directory environments.

$199.00 $399.00 50% OFF

Course Overview

Welcome to the Windows Red Teaming course! This comprehensive course is designed to provide in-depth knowledge and hands-on skills for simulating adversarial behavior in a Windows Active Directory (AD) environment.

Whether you're preparing for a career in red teaming, penetration testing, or advanced threat emulation, this course equips you with the techniques and methodologies to effectively attack and exploit Windows environments.
The course covers topics such as:
  • Active Directory architecture and authentication mechanisms
  • Techniques for enumeration, password attacks, and lateral movement
  • Exploiting misconfigurations in AD, ADCS, group policies, and permissions
  • Advanced techniques like Kerberos attacks, domain trust exploitation, and persistence mechanisms
  • Real-world case studies on exploiting Active Directory vulnerabilities such as ZeroLogon, PrintNightmare, and more

By combining theory with practical demonstrations in a lab setup, this course ensures you gain hands-on experience and build a solid red teaming skill set.

Who Should take This Course

  • Red teamers and penetration testers aiming to specialize in Windows and Active Directory exploitation
  • Security professionals and system administrators looking to understand and secure AD environments
  • IT professionals and enthusiasts aspiring to enter the field of red teaming or advanced penetration testing
  • Students aspiring to build a career in penetration testing and red teaming

Course Curriculum


Windows Red Teaming Course

16 Exercises133 Learning Materials

Module 1: Introduction

Introduction

Video
3:1

Disclaimer

Video
1:13

Tips and Tricks

Video
1:32

Module 2: Introduction to Active Directory

Introduction

Video
1:25

Intro to Red Teaming

Video
7:31

Active Directory Architecture

Video
6:45

AD Authentication Mechanism

Video
12:15

PowerShell

Video
11:59

Note taking

Video
4:23

Summary

PDF

Technical References

PDF

Quiz

Exercise

Conclusion

Video
1:9

Module 3: Lab Setup

Introduction

Video
1:00

Active Directory Lab Setup

Video
7:42

Summary

PDF

Technical References

PDF

Quiz

Exercise

Post Module Activity

PDF

Conclusion

Video
050

Module 4: AD Enumeration

Introduction

Video
1:00

AD Enumeration

Video
12:23

Bloodhound

Video
15:30

Summary

PDF

Technical References

PDF

Quiz

Exercise

Post Module Activity

PDF

Conclusion

Video
1:00

Module 5: Password Attacks

Introduction

Video
053

Understanding Password Attacks

Video
2:12

Password in User Description

Video
3:1

Password Spraying

Video
10:39

Sensitive Information in Network Shares

Video
7:14

Summary

PDF

Technical References

PDF

Quiz

Exercise

Post Module Activity

PDF

Conclusion

Video
050

Module 6: Relay Attacks

Introduction

Video
052

Relay Attacks

Video
1:31

LLMNR Poisioning

Video
14:27

IPv6 DNS Takeover

Video
10:19

WebDAV

Video
11:6

Summary

PDF

Technical References

PDF

Quiz

Exercise

Post Module Activity

PDF

Conclusion

Video
046

Module 7: Misconfigured Permissions

Introduction

Video
048

Understanding Permissions

Video
8:4

Exploiting Permissions

Video
21:57

Summary

PDF

Technical References

PDF

Quiz

Exercise

Post Module Activity

PDF

Conclusion

Video
041

Module 8: Group Policies

Introduction

Video
050

Understanding Group Policies

Video
5:56

Abusing Group Policies

Video
8:36

Group Policy Preference Passwords

Video
4:00

Summary

PDF

Technical References

PDF

Quiz

Exercise

Post Module Activity

PDF

Conclusion

Video
046

Module 9: Lateral Movement

Introduction

Video
041

Local Admin Password Spray

Video
5:50

Lateral Movement Techniques

Video
11:32

Pass-the-hash & Over-pass-the-hash

Video
8:28

Summary

PDF

Technical References

PDF

Quiz

Exercise

Post Module Activity

PDF

Conclusion

Video
037

Module 10: Credential Dumping

Introduction

Video
050

Credential Dumping

Video
10:10

Domain Cached Credentials (DCC)

Video
6:35

Summary

PDF

Technical References

PDF

Quiz

Exercise

Post Module Activity

PDF

Conclusion

Video
029

Module 11: Kerberos Attacks

Introduction

Video
045

Kerberos Attacks

Video
2:32

Kerberoasting & ASREP Roast

Video
16:22

Understanding Kerberos Delegations

Video
11:17

Resource-Based Constrained Delegation

Video
8:35

Shadow Credentials

Video
9:31

Summary

PDF

Technical References

PDF

Quiz

Exercise

Post Module Activity

PDF

Conclusion

Video
032

Module 12: AD Certificates

Introduction

Video
041

Active Directory Certificate Services (ADCS)

Video
8:3

Misconfigured Certificate Templates

Video
18:26

Misconfigured Certificate Authority

Video
10:31

Summary

PDF

Technical References

PDF

Quiz

Exercise

Post Module Activity

PDF

Conclusion

Video
031

Module 13: MSSQL Trust Links

Introduction

Video
038

Understanding MSSQL Trust Links

Video
4:30

Exploiting MSSQL Trust Links

Video
7:12

Summary

PDF

Technical References

PDF

Quiz

Exercise

Post Module Activity

PDF

Conclusion

Video
028

Module 14: CVEs

Introduction

Video
047

Active Directory CVEs

Video
2:10

MS14-068 Checksum Validation

Video
6:43

ZeroLogon

Video
5:10

PrintNightmare

Video
3:37

samAccountName Spoofing

Video
3:50

Summary

PDF

Technical References

PDF

Quiz

Exercise

Post Module Activity

PDF

Conclusion

Video
033

Module 15: Post Exploitation

Introduction

Video
039

Credential Dumping

Video
7:53

Password Analysis

Video
6:14

Summary

PDF

Technical References

PDF

Quiz

Exercise

Post Module Activity

PDF

Conclusion

Video
028

Module 16: Domain Persistence

Introduction

Video
039

Domain Persistence

Video
2:16

Golden Ticket

Video
6:30

Silver Ticket

Video
5:40

Skeleton Key

Video
6:32

Summary

PDF

Technical References

PDF

Quiz

Exercise

Post Module Activity

PDF

Conclusion

Video
031

Module 17: Domain Trusts

Introduction

Video
039

Understanding Domain Trusts

Video
6:9

Exploiting Domain Trusts

Video
7:20

Summary

PDF

Technical References

PDF

Quiz

Exercise

Post Module Activity

PDF

Conclusion

Video
030

Module18: Conclusion

Conclusion

Video
1:33

Bonus: Discount on other courses

Bonus: Discount on other courses

PDF

Course Instructor

Shashi Kant Prasad

Senior Security Consultant

Shashi Kant Prasad is an adept red teamer at Redfox Security. Shashi possesses a broad range of knowledge and expertise in penetration testing across various domains, including Cloud, Web Apps, Hardware, DevOps, and Red Teaming. He has also delivered training at various security conferences, sharing his expertise with peers and contributing to the advancement of cybersecurity knowledge within the community.

Key Takeaways

  • Understand the architecture of Active Directory and its key components
  • Perform enumeration and identify misconfigurations in Windows environments
  • Exploit vulnerabilities in group policies, ADCS , and domain trusts
  • Gain hands-on experience with exploiting real-world Active Directory vulnerabilities
  • Develop strategies for maintaining persistence in compromised environments
  • Apply practical knowledge in real world scenarios

System Requirements

  • Operating System: Windows, Linux, or macOS with virtualization support enabled.
  • Memory: A minimum of 16 GB RAM.
  • Storage: At least 256 GB of free disk space.

FAQs

Is this course suitable for beginners?

While some prior knowledge of Windows environments is recommended, this course starts with foundational concepts and builds up to advanced topics, making it beginner-friendly.

Will I get hands-on experience?

Yes! Each topic is paired with practical exercises in a lab environment to reinforce your learning.

How long does it take to complete this course?

The course is self-paced. With consistent effort, you can complete it in 6–8 weeks, depending on your prior experience.

Does this course cover real-world scenarios?

Absolutely! The course includes exploitation of real-world Active Directory vulnerabilities and misconfigurations encountered in professional red teaming engagements.

Can this course help me prepare for a red teaming role?

Yes, this course is designed to provide the technical skills and methodologies needed for red teaming, making it an excellent step toward a professional role.

Will I receive a certificate?

Yes, participants will receive a certificate of completion after successfully completing the course.

Featured Courses

Our courses are packed with rich, engaging content, including video lectures, practical exercises, and quizzes, ensuring you get a comprehensive learning experience. Don't wait—join Redfox Academy today and take the first step towards a successful career in cybersecurity!

Ready to Master the Art of Pentesting?

Choose our pentesting courses for:

Affordable Price

Unlock your potential with affordable upskilling! Our unbeatable course prices are your chance to level up without breaking the bank. Don't wait to enhance your skills – join us today and take the first step towards a brighter future!

Lifetime Access

Acquire lifetime access to our resources when you buy our courses. With recorded lectures, post-module activities, and walk-through labs, perfecting your understanding of the subject matter like a pro is just a click away. Gain knowledge today and unlock a lifetime of learning.

Certificate of Completion

Upon completing our course, you'll receive a certificate of completion to showcase your new skills. Add it to your resume or LinkedIn profile to stand out to potential employers. Let your accomplishments speak for themselves and take your career to the next level!

Hands-On Experience

Get hands-on experience with real-world scenarios and challenges, giving you practical skills that you can apply immediately in your career.

Expert Instructors

Learn from industry experts with years of experience in pentesting, who are passionate about sharing their knowledge and helping you succeed.

Flexible Learning

Whether you're a beginner or an experienced professional, our courses are designed to meet you where you are and help you reach your goals.

Get in Touch

Have a question, need assistance, or want to collaborate? We’re here to help!

Whether you're looking for cutting-edge cybersecurity solutions or expert training or want to learn more about our services, contact us today.

+91